- Issued:
- 2008-07-24
- Updated:
- 2008-07-24
RHBA-2008:0160 - Bug Fix Advisory
Synopsis
tftp bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated tftp packages that fix several bugs are now available.
Description
The Trivial File Transfer Protocol (TFTP) is normally used only for booting
diskless workstations. The tftp package provides the user interface for
TFTP, which allows users to transfer files to and from a remote machine.
The tftp-server package provides the server for TFTP which allows users to
transfer files to and from a remote machine.
These updated packages fix the following bugs:
- when a tftp client sent a request to 255.255.255.255 (the limited
broadcast address) tftpd failed. tfptd would remember the address the
client sent the address to (255.255.255.255) and attempt to respond using
this as the source address. This is the right thing to do for multi-homed
tftp servers but failed because using the limited broadcast address as a
source address is not allowed. These updated packages fix this by changing
the source address used by tftpd when responding to such requests from
INADDR_BROADCAST to INADDR_ANY.
- tftp-server rejected "r" re-mapping rules (for re-writing a matched
string with a given pattern) incorrectly. Amongst other errors, this
prevented "\\" being re-mapped to "/", causing problems for Windows
clients. These updated packages no longer reject "r" rules incorrectly. As
well, they now return an informative error message when they correctly
reject a rule.
- the time stamp on tftp-server log files in /var/log/messages used UTC
rather than the local system time. The time stamp on log files produced by
these updated packages now uses the local system time.
All users of tftp-server should upgrade to these updated packages, which
resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 242653 - tftp-server log in GMT instead of localtime
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
tftp-0.39-3.el4.src.rpm | SHA-256: 0f507ac5d33e2ac41312ff91423cc16cacb7bb2d8244229a9d91b2936e8c0406 |
x86_64 | |
tftp-0.39-3.el4.x86_64.rpm | SHA-256: 058b74c495437ae25dcd31f5bcc84c44d66c418ffb350c40d003c10983dfc32f |
tftp-0.39-3.el4.x86_64.rpm | SHA-256: 058b74c495437ae25dcd31f5bcc84c44d66c418ffb350c40d003c10983dfc32f |
tftp-server-0.39-3.el4.x86_64.rpm | SHA-256: e688147901917b4dcb4d9cef73bde97846c75dcb507c82aa8e2834b3f296886b |
tftp-server-0.39-3.el4.x86_64.rpm | SHA-256: e688147901917b4dcb4d9cef73bde97846c75dcb507c82aa8e2834b3f296886b |
ia64 | |
tftp-0.39-3.el4.ia64.rpm | SHA-256: 5b482501edc7efac3872589bcca8e783bb33e34239417bf10b55bb66a3f7ecca |
tftp-0.39-3.el4.ia64.rpm | SHA-256: 5b482501edc7efac3872589bcca8e783bb33e34239417bf10b55bb66a3f7ecca |
tftp-server-0.39-3.el4.ia64.rpm | SHA-256: e4de0faccec91bdcd869096253e6259fde0f6d427d29605718160eac16eb7352 |
tftp-server-0.39-3.el4.ia64.rpm | SHA-256: e4de0faccec91bdcd869096253e6259fde0f6d427d29605718160eac16eb7352 |
i386 | |
tftp-0.39-3.el4.i386.rpm | SHA-256: b8cef71a977d00e619d6813077bf89bc792c4fd89533513e1bbc0200866a842b |
tftp-0.39-3.el4.i386.rpm | SHA-256: b8cef71a977d00e619d6813077bf89bc792c4fd89533513e1bbc0200866a842b |
tftp-server-0.39-3.el4.i386.rpm | SHA-256: e6d5b29074646871ffe38d7dd339a05c0859c95d15fd43a685a5f5eaa9b64add |
tftp-server-0.39-3.el4.i386.rpm | SHA-256: e6d5b29074646871ffe38d7dd339a05c0859c95d15fd43a685a5f5eaa9b64add |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
tftp-0.39-3.el4.src.rpm | SHA-256: 0f507ac5d33e2ac41312ff91423cc16cacb7bb2d8244229a9d91b2936e8c0406 |
x86_64 | |
tftp-0.39-3.el4.x86_64.rpm | SHA-256: 058b74c495437ae25dcd31f5bcc84c44d66c418ffb350c40d003c10983dfc32f |
tftp-server-0.39-3.el4.x86_64.rpm | SHA-256: e688147901917b4dcb4d9cef73bde97846c75dcb507c82aa8e2834b3f296886b |
ia64 | |
tftp-0.39-3.el4.ia64.rpm | SHA-256: 5b482501edc7efac3872589bcca8e783bb33e34239417bf10b55bb66a3f7ecca |
tftp-server-0.39-3.el4.ia64.rpm | SHA-256: e4de0faccec91bdcd869096253e6259fde0f6d427d29605718160eac16eb7352 |
i386 | |
tftp-0.39-3.el4.i386.rpm | SHA-256: b8cef71a977d00e619d6813077bf89bc792c4fd89533513e1bbc0200866a842b |
tftp-server-0.39-3.el4.i386.rpm | SHA-256: e6d5b29074646871ffe38d7dd339a05c0859c95d15fd43a685a5f5eaa9b64add |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
tftp-0.39-3.el4.src.rpm | SHA-256: 0f507ac5d33e2ac41312ff91423cc16cacb7bb2d8244229a9d91b2936e8c0406 |
x86_64 | |
tftp-0.39-3.el4.x86_64.rpm | SHA-256: 058b74c495437ae25dcd31f5bcc84c44d66c418ffb350c40d003c10983dfc32f |
tftp-server-0.39-3.el4.x86_64.rpm | SHA-256: e688147901917b4dcb4d9cef73bde97846c75dcb507c82aa8e2834b3f296886b |
i386 | |
tftp-0.39-3.el4.i386.rpm | SHA-256: b8cef71a977d00e619d6813077bf89bc792c4fd89533513e1bbc0200866a842b |
tftp-server-0.39-3.el4.i386.rpm | SHA-256: e6d5b29074646871ffe38d7dd339a05c0859c95d15fd43a685a5f5eaa9b64add |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
tftp-0.39-3.el4.src.rpm | SHA-256: 0f507ac5d33e2ac41312ff91423cc16cacb7bb2d8244229a9d91b2936e8c0406 |
s390x | |
tftp-0.39-3.el4.s390x.rpm | SHA-256: 041403f08db0356617987cd6ff551c04b5cac20878ed24c7fb1fec52679d0504 |
tftp-server-0.39-3.el4.s390x.rpm | SHA-256: b0631417a081016462f4189a9156875d6f461ecc9b363ec626823716c09227f8 |
s390 | |
tftp-0.39-3.el4.s390.rpm | SHA-256: 180b74a013646d492222fde4c26394e696cbcb42f11218cee3639f287cae4e9c |
tftp-server-0.39-3.el4.s390.rpm | SHA-256: 17f8bce5f332c07783d807651e0e0e4fa6aa5483d8bb2f0ca234061854ecec51 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
tftp-0.39-3.el4.src.rpm | SHA-256: 0f507ac5d33e2ac41312ff91423cc16cacb7bb2d8244229a9d91b2936e8c0406 |
ppc | |
tftp-0.39-3.el4.ppc.rpm | SHA-256: 5824ed767b86caa6aa89d527d5cbe41897d9448394f781bdc765407cbd10a2ea |
tftp-server-0.39-3.el4.ppc.rpm | SHA-256: 6b0353f019fb1bb901fd6e6de8f76b9212a1472795e1b522b3d7fbb88c28d50e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.