- Issued:
- 2012-10-10
- Updated:
- 2013-02-20
RHBA-2012:1354 - Bug Fix Advisory
Synopsis
ftp bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ftp packages that fix four bugs are now available for Red Hat Enterprise
Linux 6.
Description
The ftp packages provide the standard UNIX command line File Transfer Protocol
(FTP) client. FTP is a widely used protocol for transferring files over the
Internet, and for archiving files.
This update fixes the following bugs:
- Previously, the command line width in the ftp client was limited to 200
characters. With this update, the maximum possible length of the FTP command
line is extended to 4296 characters. (BZ#665337)
- Prior to this update, "append", "put", and "send" commands were causing system
memory to leak. The memory holding the ftp command was not freed appropriately.
With this update, the underlying source code has been improved to correctly free
the system resources and the memory leaks are no longer present. (BZ#786004)
- Previously, the ftp client could not be invoked to run directly in the active
mode. This functionality has been added to the source code and documented in the
manual page. The client can now be executed with an additional "-A" command line
parameter and will run in the active mode. (BZ#849940)
- Previously, the ftp client hung up when the ftp-data port (20) was not
available (e.g. was blocked). The client then had to be terminated manually.
Additional logic has been added to the source code. With this update, ftp has an
internal timeout set to 30 seconds. If there is no answer from the server when
this time has passed, ftp will now gracefully time out and not hang up.
(BZ#852636)
All users of ftp are advised to upgrade to these updated packages, which fix
these bugs.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
Fixes
- BZ - 849940 - ftp client does not support active mode from command line invocation
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
ftp-0.17-52.el6.src.rpm | SHA-256: 200415397c9cae2a65f3d898436647f5658a047ace8a02091d191432bc44f00f |
x86_64 | |
ftp-0.17-52.el6.x86_64.rpm | SHA-256: d7e8ebc4a4bf27807ac39ffce24bbc15dc0429367c1ee73dd5ee6eb780a51d7e |
ftp-debuginfo-0.17-52.el6.x86_64.rpm | SHA-256: 7fab203bdf7be353c5444469054b38737b20bd7640ded5c1ff32f086646c09df |
i386 | |
ftp-0.17-52.el6.i686.rpm | SHA-256: d31077f6995be7e0a4ac8e49f7f102dd791d987aa178b3f9003f8d63b431e44e |
ftp-debuginfo-0.17-52.el6.i686.rpm | SHA-256: 8ff34b21dec03d89659afb179a4a7de43684e2b5317fdfcddc2af2da21a09031 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
ftp-0.17-52.el6.src.rpm | SHA-256: 200415397c9cae2a65f3d898436647f5658a047ace8a02091d191432bc44f00f |
x86_64 | |
ftp-0.17-52.el6.x86_64.rpm | SHA-256: d7e8ebc4a4bf27807ac39ffce24bbc15dc0429367c1ee73dd5ee6eb780a51d7e |
ftp-debuginfo-0.17-52.el6.x86_64.rpm | SHA-256: 7fab203bdf7be353c5444469054b38737b20bd7640ded5c1ff32f086646c09df |
i386 | |
ftp-0.17-52.el6.i686.rpm | SHA-256: d31077f6995be7e0a4ac8e49f7f102dd791d987aa178b3f9003f8d63b431e44e |
ftp-debuginfo-0.17-52.el6.i686.rpm | SHA-256: 8ff34b21dec03d89659afb179a4a7de43684e2b5317fdfcddc2af2da21a09031 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
ftp-0.17-52.el6.src.rpm | SHA-256: 200415397c9cae2a65f3d898436647f5658a047ace8a02091d191432bc44f00f |
x86_64 | |
ftp-0.17-52.el6.x86_64.rpm | SHA-256: d7e8ebc4a4bf27807ac39ffce24bbc15dc0429367c1ee73dd5ee6eb780a51d7e |
ftp-debuginfo-0.17-52.el6.x86_64.rpm | SHA-256: 7fab203bdf7be353c5444469054b38737b20bd7640ded5c1ff32f086646c09df |
i386 | |
ftp-0.17-52.el6.i686.rpm | SHA-256: d31077f6995be7e0a4ac8e49f7f102dd791d987aa178b3f9003f8d63b431e44e |
ftp-debuginfo-0.17-52.el6.i686.rpm | SHA-256: 8ff34b21dec03d89659afb179a4a7de43684e2b5317fdfcddc2af2da21a09031 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
ftp-0.17-52.el6.src.rpm | SHA-256: 200415397c9cae2a65f3d898436647f5658a047ace8a02091d191432bc44f00f |
x86_64 | |
ftp-0.17-52.el6.x86_64.rpm | SHA-256: d7e8ebc4a4bf27807ac39ffce24bbc15dc0429367c1ee73dd5ee6eb780a51d7e |
ftp-debuginfo-0.17-52.el6.x86_64.rpm | SHA-256: 7fab203bdf7be353c5444469054b38737b20bd7640ded5c1ff32f086646c09df |
i386 | |
ftp-0.17-52.el6.i686.rpm | SHA-256: d31077f6995be7e0a4ac8e49f7f102dd791d987aa178b3f9003f8d63b431e44e |
ftp-debuginfo-0.17-52.el6.i686.rpm | SHA-256: 8ff34b21dec03d89659afb179a4a7de43684e2b5317fdfcddc2af2da21a09031 |
Red Hat Enterprise Linux for IBM z Systems 6
SRPM | |
---|---|
ftp-0.17-52.el6.src.rpm | SHA-256: 200415397c9cae2a65f3d898436647f5658a047ace8a02091d191432bc44f00f |
s390x | |
ftp-0.17-52.el6.s390x.rpm | SHA-256: 03d2aa24cbb7b404d47d6fefee817c3dfbb7c158253998d06f474f41e9074ed2 |
ftp-debuginfo-0.17-52.el6.s390x.rpm | SHA-256: d887393487fa33f0c3b50a290dd5f83306a3687883737356b67b0a201130a841 |
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
ftp-0.17-52.el6.src.rpm | SHA-256: 200415397c9cae2a65f3d898436647f5658a047ace8a02091d191432bc44f00f |
ppc64 | |
ftp-0.17-52.el6.ppc64.rpm | SHA-256: 4ff9ca838b60b18acd25094d1c0cf37d11010fa79294f9f20e408250299bdce9 |
ftp-debuginfo-0.17-52.el6.ppc64.rpm | SHA-256: 64259a367938ce887c4f2c3c418dee100c129dfbeca54c206be1c06670815570 |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
ftp-0.17-52.el6.src.rpm | SHA-256: 200415397c9cae2a65f3d898436647f5658a047ace8a02091d191432bc44f00f |
x86_64 | |
ftp-0.17-52.el6.x86_64.rpm | SHA-256: d7e8ebc4a4bf27807ac39ffce24bbc15dc0429367c1ee73dd5ee6eb780a51d7e |
ftp-debuginfo-0.17-52.el6.x86_64.rpm | SHA-256: 7fab203bdf7be353c5444469054b38737b20bd7640ded5c1ff32f086646c09df |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
ftp-0.17-52.el6.src.rpm | SHA-256: 200415397c9cae2a65f3d898436647f5658a047ace8a02091d191432bc44f00f |
x86_64 | |
ftp-0.17-52.el6.x86_64.rpm | SHA-256: d7e8ebc4a4bf27807ac39ffce24bbc15dc0429367c1ee73dd5ee6eb780a51d7e |
ftp-debuginfo-0.17-52.el6.x86_64.rpm | SHA-256: 7fab203bdf7be353c5444469054b38737b20bd7640ded5c1ff32f086646c09df |
i386 | |
ftp-0.17-52.el6.i686.rpm | SHA-256: d31077f6995be7e0a4ac8e49f7f102dd791d987aa178b3f9003f8d63b431e44e |
ftp-debuginfo-0.17-52.el6.i686.rpm | SHA-256: 8ff34b21dec03d89659afb179a4a7de43684e2b5317fdfcddc2af2da21a09031 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6
SRPM | |
---|---|
ftp-0.17-52.el6.src.rpm | SHA-256: 200415397c9cae2a65f3d898436647f5658a047ace8a02091d191432bc44f00f |
s390x | |
ftp-0.17-52.el6.s390x.rpm | SHA-256: 03d2aa24cbb7b404d47d6fefee817c3dfbb7c158253998d06f474f41e9074ed2 |
ftp-debuginfo-0.17-52.el6.s390x.rpm | SHA-256: d887393487fa33f0c3b50a290dd5f83306a3687883737356b67b0a201130a841 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.