- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2011:1540 - Bug Fix Advisory
Synopsis
fetchmail bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated fetchmail package that fixes a bug is now available for Red Hat
Enterprise Linux 5.
Description
Fetchmail is a remote mail retrieval and forwarding utility intended for use
over on-demand TCP/IP links, like SLIP or PPP connections.
This updated package fixes the following bug:
- Previously, fetchmail would fail with a socket error when attempting to write
to a BSMTP (Batch Simple Mail Transport Protocol) batch file when downloading
mail. It failed with a socket error after writing the first header to the BSMTP
batch file and displayed, "socket error while fetching from". As a result,
fetchmail could not download mail using BSMTP. With this update to fetchmail,
the fetchmail package will now correctly write to the BSMTP batch file.
(BZ#620640)
All users of fetchmail are advised to upgrade to this updated package, which
resolves this issue.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 620640 - fetchmail - bsmtp fails
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
fetchmail-6.3.6-4.el5.src.rpm | SHA-256: d0e6af3c51d4f38f7a1f71e9f77c3637e835187210a0e078e87171a80e2aa3a2 |
x86_64 | |
fetchmail-6.3.6-4.el5.x86_64.rpm | SHA-256: 306f042fa69f88cc27b06f4e4de2ccffab2f2ee810c7a04dd88b7836d08737a1 |
ia64 | |
fetchmail-6.3.6-4.el5.ia64.rpm | SHA-256: db72c6bd57b09ed5a0576ab346f148715516700ae6e65f660a4db08170291977 |
i386 | |
fetchmail-6.3.6-4.el5.i386.rpm | SHA-256: 3a636669aa98bb77fb97a7eea528dbbe9d0e7217c063df8660ea42739b2acd62 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
fetchmail-6.3.6-4.el5.src.rpm | SHA-256: d0e6af3c51d4f38f7a1f71e9f77c3637e835187210a0e078e87171a80e2aa3a2 |
x86_64 | |
fetchmail-6.3.6-4.el5.x86_64.rpm | SHA-256: 306f042fa69f88cc27b06f4e4de2ccffab2f2ee810c7a04dd88b7836d08737a1 |
i386 | |
fetchmail-6.3.6-4.el5.i386.rpm | SHA-256: 3a636669aa98bb77fb97a7eea528dbbe9d0e7217c063df8660ea42739b2acd62 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
fetchmail-6.3.6-4.el5.src.rpm | SHA-256: d0e6af3c51d4f38f7a1f71e9f77c3637e835187210a0e078e87171a80e2aa3a2 |
s390x | |
fetchmail-6.3.6-4.el5.s390x.rpm | SHA-256: 7d0fcea021a31fdabcdb0548789ad725ab76345cf54b2f067539d4702ffc523d |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
fetchmail-6.3.6-4.el5.src.rpm | SHA-256: d0e6af3c51d4f38f7a1f71e9f77c3637e835187210a0e078e87171a80e2aa3a2 |
ppc | |
fetchmail-6.3.6-4.el5.ppc.rpm | SHA-256: a54bba072c0f65ac99e90fc4363ebc82077dabf8a4fdc3c0f0482a54d6b538a8 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
fetchmail-6.3.6-4.el5.src.rpm | SHA-256: d0e6af3c51d4f38f7a1f71e9f77c3637e835187210a0e078e87171a80e2aa3a2 |
x86_64 | |
fetchmail-6.3.6-4.el5.x86_64.rpm | SHA-256: 306f042fa69f88cc27b06f4e4de2ccffab2f2ee810c7a04dd88b7836d08737a1 |
i386 | |
fetchmail-6.3.6-4.el5.i386.rpm | SHA-256: 3a636669aa98bb77fb97a7eea528dbbe9d0e7217c063df8660ea42739b2acd62 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.