Updated lftp packages that fix one bug are now available for Red Hat EnterpriseLinux 7.
LFTP is a file transfer utility for File Transfer Protocol (FTP), Secure FileTransfer Protocol (SFTP), Hypertext Transfer Protocol (HTTP), and other commonlyused protocols. It uses the readline library for input, and provides support forbookmarks, built-in monitoring, job control, and parallel transfer of multiplefiles at the same time.This update fixes the following bug:* Previously, when mirroring files with the lftp utility over SFTP, lftpsometimes received EOF from SSH before it was able to flush the rest of the databuffer. As a consequence, the last data packet was lost. This update adds acondition to ensure that if there is some data left in the buffer in thedescribed situation, the data is safely passed to the internal buffer. As aresult, data packets are no longer lost in the described scenario. (BZ#1392944)Users of lftp are advised to upgrade to these updated packages, which fix thisbug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 7)

SRPMS:
lftp-4.4.8-8.el7_3.2.src.rpm
    MD5: 32b2fdf953c0e1a6463185b24b87953eSHA-256: f83a8f962c00fe8b4b357d15553fec8b8570b458cad649ea85dfd5106bbc3770
 
x86_64:
lftp-4.4.8-8.el7_3.2.i686.rpm
    MD5: 7dac04214f0cc5fb942ee79ae9cdba7cSHA-256: cf34037dc04a8758b906fda491361501c6d53bcdc842d45512faac889cf2ac44
lftp-4.4.8-8.el7_3.2.x86_64.rpm
    MD5: 0b652348f2bd3dfe1eab2ecc91993d94SHA-256: e4b37111e3fc9a74878efee3851a008767221f58881eefbddb49efa45f344735
lftp-debuginfo-4.4.8-8.el7_3.2.i686.rpm
    MD5: ac4d066f1dcb96b1f86fdff80cddb75bSHA-256: cbb1b24d8634e201948ff37f9151c24d477aaa6aa75dfa27fc693adeac21c34f
lftp-debuginfo-4.4.8-8.el7_3.2.x86_64.rpm
    MD5: 03dbbaec1cff1109a04e672e9fd8784aSHA-256: 0319bbabf90cd63013f34a1e53e3e2a12377816c76d3597f761c6a2fce8093f5
lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm
    MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf
 
Red Hat Enterprise Linux HPC Node (v. 7)

SRPMS:
lftp-4.4.8-8.el7_3.2.src.rpm
    MD5: 32b2fdf953c0e1a6463185b24b87953eSHA-256: f83a8f962c00fe8b4b357d15553fec8b8570b458cad649ea85dfd5106bbc3770
 
x86_64:
lftp-4.4.8-8.el7_3.2.i686.rpm
    MD5: 7dac04214f0cc5fb942ee79ae9cdba7cSHA-256: cf34037dc04a8758b906fda491361501c6d53bcdc842d45512faac889cf2ac44
lftp-4.4.8-8.el7_3.2.x86_64.rpm
    MD5: 0b652348f2bd3dfe1eab2ecc91993d94SHA-256: e4b37111e3fc9a74878efee3851a008767221f58881eefbddb49efa45f344735
lftp-debuginfo-4.4.8-8.el7_3.2.i686.rpm
    MD5: ac4d066f1dcb96b1f86fdff80cddb75bSHA-256: cbb1b24d8634e201948ff37f9151c24d477aaa6aa75dfa27fc693adeac21c34f
lftp-debuginfo-4.4.8-8.el7_3.2.x86_64.rpm
    MD5: 03dbbaec1cff1109a04e672e9fd8784aSHA-256: 0319bbabf90cd63013f34a1e53e3e2a12377816c76d3597f761c6a2fce8093f5
lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm
    MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf
 
Red Hat Enterprise Linux Server (v. 7)

SRPMS:
lftp-4.4.8-8.el7_3.2.src.rpm
    MD5: 32b2fdf953c0e1a6463185b24b87953eSHA-256: f83a8f962c00fe8b4b357d15553fec8b8570b458cad649ea85dfd5106bbc3770
 
PPC:
lftp-4.4.8-8.el7_3.2.ppc.rpm
    MD5: 0d4e3899c45f7719a796e935ac9bec69SHA-256: 79c7fe8f24f7f10360541453a1f554f542d66d36d704a1f9e16b62e33805208e
lftp-4.4.8-8.el7_3.2.ppc64.rpm
    MD5: ef5ea105c9a7d01cc3c60ba89b984665SHA-256: efe7d81120d54733bc2d747a28fc15f8f590d05c140dd407ddb8cb722928a1ef
lftp-debuginfo-4.4.8-8.el7_3.2.ppc.rpm
    MD5: 27609feea0968a8b3b199470b3066f2fSHA-256: 14433614d5ecc5c87fa468300d79f524de735251c4642f33119aa413dac3fc73
lftp-debuginfo-4.4.8-8.el7_3.2.ppc64.rpm
    MD5: 0746383af9ca3e9bc857a6ed300ab93cSHA-256: c31d9b8fd7a957714620292aeea8333b33ea6fb93d481e5a5f8f4307f5d0b47e
lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm
    MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf
 
PPC64LE:
lftp-4.4.8-8.el7_3.2.ppc64le.rpm
    MD5: 41f78266bd3d2ded60aad498296be9aaSHA-256: 437ac914567957cc645999b225181a291b472d8c283e16cea4c1f08aad6ad3a5
lftp-debuginfo-4.4.8-8.el7_3.2.ppc64le.rpm
    MD5: c85f2d06b56520fd9d5de9b3ca7586ccSHA-256: bffae09d2b914f3d8b3d94b5478b39fe2bc83a85bcdc637d9698137fe5631d9b
lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm
    MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf
 
s390x:
lftp-4.4.8-8.el7_3.2.s390.rpm
    MD5: 2905cc336f49952d5ec21b8f0a0d0a0aSHA-256: da31820175d36b798be6830daf87f329dfd949f5da413dcc6043bccb1a8f3787
lftp-4.4.8-8.el7_3.2.s390x.rpm
    MD5: 0d39a9c0b5bdf8deaa168b2d4d499a73SHA-256: 8f9ce2ef8ac5e871b6c0b7504baf50369ec8fcc5a58773fafe4d2719ae6b4a64
lftp-debuginfo-4.4.8-8.el7_3.2.s390.rpm
    MD5: 4c9767cd4de6e4eb9b02c39cb4a21466SHA-256: 8186d99f918622bae44cb3c3672e159d4b187ae02d78ebe40e767c1ea1e52a99
lftp-debuginfo-4.4.8-8.el7_3.2.s390x.rpm
    MD5: 7b81e54713b1eea893fb0a70b1d37913SHA-256: bf80c5b99f0bcc65848e095f5484661dc5181d81d23c3ee9ef7851181ed3802a
lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm
    MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf
 
x86_64:
lftp-4.4.8-8.el7_3.2.i686.rpm
    MD5: 7dac04214f0cc5fb942ee79ae9cdba7cSHA-256: cf34037dc04a8758b906fda491361501c6d53bcdc842d45512faac889cf2ac44
lftp-4.4.8-8.el7_3.2.x86_64.rpm
    MD5: 0b652348f2bd3dfe1eab2ecc91993d94SHA-256: e4b37111e3fc9a74878efee3851a008767221f58881eefbddb49efa45f344735
lftp-debuginfo-4.4.8-8.el7_3.2.i686.rpm
    MD5: ac4d066f1dcb96b1f86fdff80cddb75bSHA-256: cbb1b24d8634e201948ff37f9151c24d477aaa6aa75dfa27fc693adeac21c34f
lftp-debuginfo-4.4.8-8.el7_3.2.x86_64.rpm
    MD5: 03dbbaec1cff1109a04e672e9fd8784aSHA-256: 0319bbabf90cd63013f34a1e53e3e2a12377816c76d3597f761c6a2fce8093f5
lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm
    MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf
 
Red Hat Enterprise Linux Server TUS (v. 7.3)

SRPMS:
lftp-4.4.8-8.el7_3.2.src.rpm
    MD5: 32b2fdf953c0e1a6463185b24b87953eSHA-256: f83a8f962c00fe8b4b357d15553fec8b8570b458cad649ea85dfd5106bbc3770
 
x86_64:
lftp-4.4.8-8.el7_3.2.i686.rpm
    MD5: 7dac04214f0cc5fb942ee79ae9cdba7cSHA-256: cf34037dc04a8758b906fda491361501c6d53bcdc842d45512faac889cf2ac44
lftp-4.4.8-8.el7_3.2.x86_64.rpm
    MD5: 0b652348f2bd3dfe1eab2ecc91993d94SHA-256: e4b37111e3fc9a74878efee3851a008767221f58881eefbddb49efa45f344735
lftp-debuginfo-4.4.8-8.el7_3.2.i686.rpm
    MD5: ac4d066f1dcb96b1f86fdff80cddb75bSHA-256: cbb1b24d8634e201948ff37f9151c24d477aaa6aa75dfa27fc693adeac21c34f
lftp-debuginfo-4.4.8-8.el7_3.2.x86_64.rpm
    MD5: 03dbbaec1cff1109a04e672e9fd8784aSHA-256: 0319bbabf90cd63013f34a1e53e3e2a12377816c76d3597f761c6a2fce8093f5
lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm
    MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
lftp-4.4.8-8.el7_3.2.src.rpm
    MD5: 32b2fdf953c0e1a6463185b24b87953eSHA-256: f83a8f962c00fe8b4b357d15553fec8b8570b458cad649ea85dfd5106bbc3770
 
x86_64:
lftp-4.4.8-8.el7_3.2.i686.rpm
    MD5: 7dac04214f0cc5fb942ee79ae9cdba7cSHA-256: cf34037dc04a8758b906fda491361501c6d53bcdc842d45512faac889cf2ac44
lftp-4.4.8-8.el7_3.2.x86_64.rpm
    MD5: 0b652348f2bd3dfe1eab2ecc91993d94SHA-256: e4b37111e3fc9a74878efee3851a008767221f58881eefbddb49efa45f344735
lftp-debuginfo-4.4.8-8.el7_3.2.i686.rpm
    MD5: ac4d066f1dcb96b1f86fdff80cddb75bSHA-256: cbb1b24d8634e201948ff37f9151c24d477aaa6aa75dfa27fc693adeac21c34f
lftp-debuginfo-4.4.8-8.el7_3.2.x86_64.rpm
    MD5: 03dbbaec1cff1109a04e672e9fd8784aSHA-256: 0319bbabf90cd63013f34a1e53e3e2a12377816c76d3597f761c6a2fce8093f5
lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm
    MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf
 
(The unlinked packages above are only available from the Red Hat Network)

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply