Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2009:1278 - Security Advisory
Issued:
2009-09-02
Updated:
2009-09-02

RHSA-2009:1278 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: lftp security and bug fix update

Type/Severity

Security Advisory: Low

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An updated lftp package that fixes one security issue and various bugs is
now available for Red Hat Enterprise Linux 5.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

Description

LFTP is a sophisticated file transfer program for the FTP and HTTP
protocols. Like bash, it has job control and uses the readline library for
input. It has bookmarks, built-in mirroring, and can transfer several files
in parallel. It is designed with reliability in mind.

It was discovered that lftp did not properly escape shell metacharacters
when generating shell scripts using the "mirror --script" command. A
mirroring script generated to download files from a malicious FTP server
could allow an attacker controlling the FTP server to run an arbitrary
command as the user running lftp. (CVE-2007-2348)

This update also fixes the following bugs:

  • when using the "mirror" or "get" commands with the "-c" option, lftp did

not check for some specific conditions that could result in the program
becoming unresponsive, hanging and the command not completing. For example,
when waiting for a directory listing, if lftp received a "226" message,
denoting an empty directory, it previously ignored the message and kept
waiting. With this update, these conditions are properly checked for and
lftp no longer hangs when "-c" is used with "mirror" or "get". (BZ#422881)

  • when using the "put", "mput" or "reput" commands over a Secure FTP (SFTP)

connection, specifying the "-c" option sometimes resulted in corrupted
files of incorrect size. With this update, using these commands over SFTP
with the "-c" option works as expected, and transferred files are no
longer corrupted in the transfer process. (BZ#434294)

  • previously, LFTP linked to the OpenSSL library. OpenSSL's license is,

however, incompatible with LFTP's GNU GPL license and LFTP does not include
an exception allowing OpenSSL linking. With this update, LFTP links to the
GnuTLS (GNU Transport Layer Security) library, which is released under the
GNU LGPL license. Like OpenSSL, GnuTLS implements the SSL and TLS
protocols, so functionality has not changed. (BZ#458777)

  • running "help mirror" from within lftp only presented a sub-set of the

available options compared to the full list presented in the man page. With
this update, running "help mirror" in lftp presents the same list of mirror
options as is available in the Commands section of the lftp man page.
(BZ#461922)

  • LFTP imports gnu-lib from upstream. Subsequent to gnu-lib switching from

GNU GPLv2 to GNU GPLv3, the LFTP license was internally inconsistent, with
LFTP licensed as GNU GPLv2 but portions of the package apparently licensed
as GNU GPLv3 because of changes made by the gnu-lib import. With this
update, LFTP itself switches to GNU GPLv3, resolving the inconsistency.
(BZ#468858)

  • when the "ls" command was used within lftp to present a directory listing

on a remote system connected to via HTTP, file names containing spaces were
presented incorrectly. This update corrects this behavior. (BZ#504591)

  • the default alias "edit" did not define a default editor. If EDITOR was

not set in advance by the system, lftp attempted to execute
"~/.lftp/edit.tmp.$$" (which failed because the file is not set to
executable). The edit alias also did not support tab-completion of file
names and incorrectly interpreted file names containing spaces. The updated
package defines a default editor (vi) in the absence of a system-defined
EDITOR. The edit alias now also supports tab-completion and handles file
names containing spaces correctly for both downloading and uploading.
(BZ#504594)

Note: This update upgrades LFTP from version 3.7.3 to upstream version
3.7.11, which incorporates a number of further bug fixes to those noted
above. For details regarding these fixes, refer to the
"/usr/share/doc/lftp-3.7.11/NEWS" file after installing this update.
(BZ#308721)

All LFTP users are advised to upgrade to this updated package, which
resolves these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 236238 - CVE-2007-2348 lftp mirror --script does not escape names and targets of symbolic links
  • BZ - 239334 - lftp affected by problems described in CVE-2007-2348
  • BZ - 308721 - bump lftp to current version 3.7.11
  • BZ - 422881 - Using lftp with -c options causes hangs
  • BZ - 434294 - lftp corrupts data when using (m)put's -c option on sftp transport
  • BZ - 461922 - [RHEL 5] lftp 'help mirror' does not display all options defined in manpage.

CVEs

  • CVE-2007-2348

References

  • http://www.redhat.com/security/updates/classification/#low
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
lftp-3.7.11-4.el5.src.rpm SHA-256: 9cbfd04e42a32b9c82abec550d6ac1956f1efc214d41465fdbe5e406fea19e2c
x86_64
lftp-3.7.11-4.el5.x86_64.rpm SHA-256: 16d006d876a1f8a17d1e32fde337dbc3f7ba61f0ac4b86bf5e4735f11b3c47ba
ia64
lftp-3.7.11-4.el5.ia64.rpm SHA-256: ab7ebf9bc33bda15b9dd3d81d18449d00da63b9fb486db206a1f43bdd296d8e7
i386
lftp-3.7.11-4.el5.i386.rpm SHA-256: b146204399f0c3af41bca3a78e8fe28960882af6b51c319df5a6abecfdcd1532

Red Hat Enterprise Linux Workstation 5

SRPM
lftp-3.7.11-4.el5.src.rpm SHA-256: 9cbfd04e42a32b9c82abec550d6ac1956f1efc214d41465fdbe5e406fea19e2c
x86_64
lftp-3.7.11-4.el5.x86_64.rpm SHA-256: 16d006d876a1f8a17d1e32fde337dbc3f7ba61f0ac4b86bf5e4735f11b3c47ba
i386
lftp-3.7.11-4.el5.i386.rpm SHA-256: b146204399f0c3af41bca3a78e8fe28960882af6b51c319df5a6abecfdcd1532

Red Hat Enterprise Linux Desktop 5

SRPM
lftp-3.7.11-4.el5.src.rpm SHA-256: 9cbfd04e42a32b9c82abec550d6ac1956f1efc214d41465fdbe5e406fea19e2c
x86_64
lftp-3.7.11-4.el5.x86_64.rpm SHA-256: 16d006d876a1f8a17d1e32fde337dbc3f7ba61f0ac4b86bf5e4735f11b3c47ba
i386
lftp-3.7.11-4.el5.i386.rpm SHA-256: b146204399f0c3af41bca3a78e8fe28960882af6b51c319df5a6abecfdcd1532

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
lftp-3.7.11-4.el5.src.rpm SHA-256: 9cbfd04e42a32b9c82abec550d6ac1956f1efc214d41465fdbe5e406fea19e2c
s390x
lftp-3.7.11-4.el5.s390x.rpm SHA-256: 3008013662858f0373156c406fa15fcb9d65ca8085f22b4a5654f582336bfd5f

Red Hat Enterprise Linux for Power, big endian 5

SRPM
lftp-3.7.11-4.el5.src.rpm SHA-256: 9cbfd04e42a32b9c82abec550d6ac1956f1efc214d41465fdbe5e406fea19e2c
ppc
lftp-3.7.11-4.el5.ppc.rpm SHA-256: e14c1dbe2c730dba593288bc46dacba17bf90919868708485983c9db88b37fec

Red Hat Enterprise Linux Server from RHUI 5

SRPM
lftp-3.7.11-4.el5.src.rpm SHA-256: 9cbfd04e42a32b9c82abec550d6ac1956f1efc214d41465fdbe5e406fea19e2c
x86_64
lftp-3.7.11-4.el5.x86_64.rpm SHA-256: 16d006d876a1f8a17d1e32fde337dbc3f7ba61f0ac4b86bf5e4735f11b3c47ba
i386
lftp-3.7.11-4.el5.i386.rpm SHA-256: b146204399f0c3af41bca3a78e8fe28960882af6b51c319df5a6abecfdcd1532

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility