- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2011:1480 - Bug Fix Advisory
Synopsis
ftp bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated ftp package that fixes various bugs is now available for Red Hat
Enterprise Linux 5.
Description
The ftp package provides the standard UNIX command line File Transfer Protocol
(FTP) client. FTP is a widely used protocol for transferring files over the
Internet, and for archiving files.
This updated ftp package includes fixes for the following bugs:
- Prior to this update, the value of "cout" was not checked before calling
fclose(cout). As a consequence a segmentation fault could occur if the value of
"cout" was NULL. With this update the code is improved to check that the value
of "cout" is not NULL before calling fclose(cout). As a result a segmentation
fault will no longer occur in the scenario described. (BZ#694757)
- Prior to this update, the "append", "put" and "send" commands caused memory
leaks. Consequently unnecessary residual memory was consumed. With this update,
the code has been improved to free unused memory and the memory leaks no longer
occur. (BZ#735840)
- Prior to this update, the ftp client did not support selecting an active mode
connection from the command line using an option. As a consequence interactive
mode had to be used and therefore it was not possible for scripts to invoke ftp
in active mode. With this update a command line option, "-A", has been added and
as a result active mode can be invoked using scripts. (BZ#531095)
All users of ftp are advised to upgrade to this updated package, which fixes
these bugs.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 531095 - ftp client does not support active mode from command line invocation
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
ftp-0.17-37.el5.src.rpm | SHA-256: c5b1662fc112637b729c8bbf029036ca5640fdefd0a7b52a82d3bd2f37adfa81 |
x86_64 | |
ftp-0.17-37.el5.x86_64.rpm | SHA-256: eefed291c1b1325424dd456cea246646947bfe176eed887ce9a0a3562de2f38d |
ia64 | |
ftp-0.17-37.el5.ia64.rpm | SHA-256: a839a7e9dd05c0aa71517e1b1b4c17b6b1ff87d763430d89517fb6348ec3bcca |
i386 | |
ftp-0.17-37.el5.i386.rpm | SHA-256: 2c813b03aad7f668ecfe7bc38b8c56e46ebc71c51061300ab8dd4a8fbde0ca64 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
ftp-0.17-37.el5.src.rpm | SHA-256: c5b1662fc112637b729c8bbf029036ca5640fdefd0a7b52a82d3bd2f37adfa81 |
x86_64 | |
ftp-0.17-37.el5.x86_64.rpm | SHA-256: eefed291c1b1325424dd456cea246646947bfe176eed887ce9a0a3562de2f38d |
i386 | |
ftp-0.17-37.el5.i386.rpm | SHA-256: 2c813b03aad7f668ecfe7bc38b8c56e46ebc71c51061300ab8dd4a8fbde0ca64 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
ftp-0.17-37.el5.src.rpm | SHA-256: c5b1662fc112637b729c8bbf029036ca5640fdefd0a7b52a82d3bd2f37adfa81 |
x86_64 | |
ftp-0.17-37.el5.x86_64.rpm | SHA-256: eefed291c1b1325424dd456cea246646947bfe176eed887ce9a0a3562de2f38d |
i386 | |
ftp-0.17-37.el5.i386.rpm | SHA-256: 2c813b03aad7f668ecfe7bc38b8c56e46ebc71c51061300ab8dd4a8fbde0ca64 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
ftp-0.17-37.el5.src.rpm | SHA-256: c5b1662fc112637b729c8bbf029036ca5640fdefd0a7b52a82d3bd2f37adfa81 |
s390x | |
ftp-0.17-37.el5.s390x.rpm | SHA-256: 31ec2fb9ee89890b704ccd59aa89b5ad71fc256b7b05ee2f568b3b2c51e2a0a9 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
ftp-0.17-37.el5.src.rpm | SHA-256: c5b1662fc112637b729c8bbf029036ca5640fdefd0a7b52a82d3bd2f37adfa81 |
ppc | |
ftp-0.17-37.el5.ppc.rpm | SHA-256: 48ffc60d83b6d6ee6b2c48bb329f54a4c25b9d90cd7c0c6651bb843ce6cda56b |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
ftp-0.17-37.el5.src.rpm | SHA-256: c5b1662fc112637b729c8bbf029036ca5640fdefd0a7b52a82d3bd2f37adfa81 |
x86_64 | |
ftp-0.17-37.el5.x86_64.rpm | SHA-256: eefed291c1b1325424dd456cea246646947bfe176eed887ce9a0a3562de2f38d |
i386 | |
ftp-0.17-37.el5.i386.rpm | SHA-256: 2c813b03aad7f668ecfe7bc38b8c56e46ebc71c51061300ab8dd4a8fbde0ca64 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.