- Issued:
- 2012-11-08
- Updated:
- 2012-11-08
RHBA-2012:1436 - Bug Fix Advisory
Synopsis
ftp bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ftp packages that fix three bugs are now available for Red Hat
Enterprise Linux 6.
Description
The ftp packages provide the standard UNIX command line File Transfer Protocol
(FTP) client. FTP is a widely used protocol for transferring files over the
Internet, and for archiving files.
This update fixes the following bugs:
- Previously, the command line width in the ftp client was limited to 200
characters. With this update, the maximum possible length of the FTP command
line is extended to 4296 characters. (BZ#871059)
- Prior to this update, "append", "put", and "send" commands were causing system
memory to leak. The memory holding the ftp command was not freed appropriately.
With this update, the underlying source code has been improved to correctly free
the system resources and the memory leaks are no longer present. (BZ#871071)
- Previously, if a macro longer than 200 characters was defined and then used
after a connection, the ftp client crashed due to a buffer overflow. With this
update, the underlying source code was updated and the buffer that holds memory
for the macro name was extended. It now matches the length of the command line
limit mentioned above. As a result, the ftp client no longer crashes when a
macro with a long name is executed. (BZ#871546)
All users of ftp are advised to upgrade to these updated packages, which fix
these bugs.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.2 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.2 ppc64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2 x86_64
- Red Hat Storage 2.0 x86_64
- Red Hat Gluster Storage Server for On-premise 2.0 x86_64
- Red Hat Storage for Public Cloud (via RHUI) 2.0 x86_64
- Red Hat Enterprise Linux Server - AUS 6.2 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2
SRPM | |
---|---|
ftp-0.17-51.1.el6_2.1.src.rpm | SHA-256: b15bab9ba3e3a411cb2840fc843dbe029af65d96ff48f9aca238102f02f29153 |
x86_64 | |
ftp-0.17-51.1.el6_2.1.x86_64.rpm | SHA-256: 85130853996c0fe993435478720126992e3ddcc29be02c8cb51a865570adbc73 |
ftp-debuginfo-0.17-51.1.el6_2.1.x86_64.rpm | SHA-256: 782c3c57404def6cb231fc2d492c34a290024f6c8cb265f5c5893b131c876742 |
i386 | |
ftp-0.17-51.1.el6_2.1.i686.rpm | SHA-256: 22e26ee23c932a9cf68ccd29eabc9ced96e2f74e56b0cd9ea82dca7ac5d1b3a4 |
ftp-debuginfo-0.17-51.1.el6_2.1.i686.rpm | SHA-256: 087f4a9394134915d33bc528eb10077898ddfdab61fab25f4dd00de123f7a7c1 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.2
SRPM | |
---|---|
ftp-0.17-51.1.el6_2.1.src.rpm | SHA-256: b15bab9ba3e3a411cb2840fc843dbe029af65d96ff48f9aca238102f02f29153 |
s390x | |
ftp-0.17-51.1.el6_2.1.s390x.rpm | SHA-256: 67ed7ce2c3d3d1e5673394681171b69e5b154da9a71cf5e445adbb973ca78182 |
ftp-debuginfo-0.17-51.1.el6_2.1.s390x.rpm | SHA-256: 37ddfeaf07449f1d971ff17b632cbcf6013549a753c9dc025ef6f3bd332eafc1 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.2
SRPM | |
---|---|
ftp-0.17-51.1.el6_2.1.src.rpm | SHA-256: b15bab9ba3e3a411cb2840fc843dbe029af65d96ff48f9aca238102f02f29153 |
ppc64 | |
ftp-0.17-51.1.el6_2.1.ppc64.rpm | SHA-256: 21c9c7c8f5f521d2db68754750473ba005a955b942e530775eff8f9fc44ec7df |
ftp-debuginfo-0.17-51.1.el6_2.1.ppc64.rpm | SHA-256: 14733fa155de7b5a807e5db2b1a526b5198e7a1570b557d492a6c2a407b71071 |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2
SRPM | |
---|---|
ftp-0.17-51.1.el6_2.1.src.rpm | SHA-256: b15bab9ba3e3a411cb2840fc843dbe029af65d96ff48f9aca238102f02f29153 |
x86_64 | |
ftp-0.17-51.1.el6_2.1.x86_64.rpm | SHA-256: 85130853996c0fe993435478720126992e3ddcc29be02c8cb51a865570adbc73 |
ftp-debuginfo-0.17-51.1.el6_2.1.x86_64.rpm | SHA-256: 782c3c57404def6cb231fc2d492c34a290024f6c8cb265f5c5893b131c876742 |
i386 | |
ftp-0.17-51.1.el6_2.1.i686.rpm | SHA-256: 22e26ee23c932a9cf68ccd29eabc9ced96e2f74e56b0cd9ea82dca7ac5d1b3a4 |
ftp-debuginfo-0.17-51.1.el6_2.1.i686.rpm | SHA-256: 087f4a9394134915d33bc528eb10077898ddfdab61fab25f4dd00de123f7a7c1 |
Red Hat Storage 2.0
SRPM | |
---|---|
ftp-0.17-51.1.el6_2.1.src.rpm | SHA-256: b15bab9ba3e3a411cb2840fc843dbe029af65d96ff48f9aca238102f02f29153 |
x86_64 | |
ftp-0.17-51.1.el6_2.1.x86_64.rpm | SHA-256: 85130853996c0fe993435478720126992e3ddcc29be02c8cb51a865570adbc73 |
ftp-debuginfo-0.17-51.1.el6_2.1.x86_64.rpm | SHA-256: 782c3c57404def6cb231fc2d492c34a290024f6c8cb265f5c5893b131c876742 |
Red Hat Gluster Storage Server for On-premise 2.0
SRPM | |
---|---|
ftp-0.17-51.1.el6_2.1.src.rpm | SHA-256: b15bab9ba3e3a411cb2840fc843dbe029af65d96ff48f9aca238102f02f29153 |
x86_64 | |
ftp-0.17-51.1.el6_2.1.x86_64.rpm | SHA-256: 85130853996c0fe993435478720126992e3ddcc29be02c8cb51a865570adbc73 |
ftp-debuginfo-0.17-51.1.el6_2.1.x86_64.rpm | SHA-256: 782c3c57404def6cb231fc2d492c34a290024f6c8cb265f5c5893b131c876742 |
Red Hat Storage for Public Cloud (via RHUI) 2.0
SRPM | |
---|---|
ftp-0.17-51.1.el6_2.1.src.rpm | SHA-256: b15bab9ba3e3a411cb2840fc843dbe029af65d96ff48f9aca238102f02f29153 |
x86_64 | |
ftp-0.17-51.1.el6_2.1.x86_64.rpm | SHA-256: 85130853996c0fe993435478720126992e3ddcc29be02c8cb51a865570adbc73 |
ftp-debuginfo-0.17-51.1.el6_2.1.x86_64.rpm | SHA-256: 782c3c57404def6cb231fc2d492c34a290024f6c8cb265f5c5893b131c876742 |
Red Hat Enterprise Linux Server - AUS 6.2
SRPM | |
---|---|
ftp-0.17-51.1.el6_2.1.src.rpm | SHA-256: b15bab9ba3e3a411cb2840fc843dbe029af65d96ff48f9aca238102f02f29153 |
x86_64 | |
ftp-0.17-51.1.el6_2.1.x86_64.rpm | SHA-256: 85130853996c0fe993435478720126992e3ddcc29be02c8cb51a865570adbc73 |
ftp-debuginfo-0.17-51.1.el6_2.1.x86_64.rpm | SHA-256: 782c3c57404def6cb231fc2d492c34a290024f6c8cb265f5c5893b131c876742 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.