Skip to navigation

Bug Fix Advisory ftp bug fix update

Advisory: RHBA-2012:1192-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-08-22
Last updated on: 2013-02-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated ftp packages that fix one bug are now available for Red Hat Enterprise
Linux 6.

The ftp package provides the standard UNIX command line File Transfer Protocol
(FTP) client. FTP is a widely used protocol for transferring files over the
Internet, and for archiving files.

This update fixes the following bug:

* Prior to this update, using the ftp command "put" when the stack size was set
to unlimited caused the sysconf(_SC_ARG_MAX) function to return -1, which in
turn resulted in the malloc() function being called with an argument of 0 and
causing an "Out of memory" message to be displayed. With this update, the
underlying source code has been improved to allocate a reasonable minimum of
memory. As a result, the "Out of memory" message no longer appears if the stack
size was previously set to unlimited. (BZ#783868)

All users of ftp are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
ftp-0.17-51.3.el6.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 0c8eb65683cfbd718103d0782b8bcea1
SHA-256: fe643c42686deeb09a94329afac93fc00c09b49e96a7288fa83d191eb50f8bb2
 
IA-32:
ftp-0.17-51.3.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: 93bb036704795d4891fd7c2677d9ef77
SHA-256: cae52d7c419e520361da046773ed798a60038d2d5b0fec491517535b084051be
ftp-debuginfo-0.17-51.3.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: 5bb2b810965862c06e902c393494ad84
SHA-256: 332692de6f7983ee9b0436d22061e3261d7386681d4fcaa32dda65cbbf2f964b
 
x86_64:
ftp-0.17-51.3.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: e0892dcf047ad25ac6c6b29fe02310fd
SHA-256: 73949d49a205d164fad1f4fe0078c5e15929b0730d7f6bec12d5cb6709b419b3
ftp-debuginfo-0.17-51.3.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: eff0e307ca67d69f6d765209cf226cd7
SHA-256: cdb93e45e059746a796db37a13f5b999fd6335e5a0c1fb987a48ca846427537f
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
ftp-0.17-51.3.el6.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 0c8eb65683cfbd718103d0782b8bcea1
SHA-256: fe643c42686deeb09a94329afac93fc00c09b49e96a7288fa83d191eb50f8bb2
 
x86_64:
ftp-0.17-51.3.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: e0892dcf047ad25ac6c6b29fe02310fd
SHA-256: 73949d49a205d164fad1f4fe0078c5e15929b0730d7f6bec12d5cb6709b419b3
ftp-debuginfo-0.17-51.3.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: eff0e307ca67d69f6d765209cf226cd7
SHA-256: cdb93e45e059746a796db37a13f5b999fd6335e5a0c1fb987a48ca846427537f
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
ftp-0.17-51.3.el6.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 0c8eb65683cfbd718103d0782b8bcea1
SHA-256: fe643c42686deeb09a94329afac93fc00c09b49e96a7288fa83d191eb50f8bb2
 
IA-32:
ftp-0.17-51.3.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: 93bb036704795d4891fd7c2677d9ef77
SHA-256: cae52d7c419e520361da046773ed798a60038d2d5b0fec491517535b084051be
ftp-debuginfo-0.17-51.3.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: 5bb2b810965862c06e902c393494ad84
SHA-256: 332692de6f7983ee9b0436d22061e3261d7386681d4fcaa32dda65cbbf2f964b
 
PPC:
ftp-0.17-51.3.el6.ppc64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 5d993fff266892e61d8690e736564b2a
SHA-256: 33e2d788fa9bf2af3259f3793e3332a8650e82f7b64b175c3914536448c0d095
ftp-debuginfo-0.17-51.3.el6.ppc64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 8c5e7a6385797a353153ddd9f4325c8d
SHA-256: a5d8612227b3df1d4e45472ec05642b2f4a1c45f8f97821f6349f8ed3ea49550
 
s390x:
ftp-0.17-51.3.el6.s390x.rpm
File outdated by:  RHBA-2013:0845
    MD5: 233c936671a5fe354f88c6de740ce12d
SHA-256: 90442b1b89ceb2a7201d667313cc87dece7defa01781e6e9dbf9a93b7ec2e0df
ftp-debuginfo-0.17-51.3.el6.s390x.rpm
File outdated by:  RHBA-2013:0845
    MD5: 3c53e13e3dffa9932daf15da431dab59
SHA-256: 7d780e17f3767f50193c5c7f8da0cc9dcd5e62172d8eb8e2468e553d50aa0fc7
 
x86_64:
ftp-0.17-51.3.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: e0892dcf047ad25ac6c6b29fe02310fd
SHA-256: 73949d49a205d164fad1f4fe0078c5e15929b0730d7f6bec12d5cb6709b419b3
ftp-debuginfo-0.17-51.3.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: eff0e307ca67d69f6d765209cf226cd7
SHA-256: cdb93e45e059746a796db37a13f5b999fd6335e5a0c1fb987a48ca846427537f
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
ftp-0.17-51.3.el6.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 0c8eb65683cfbd718103d0782b8bcea1
SHA-256: fe643c42686deeb09a94329afac93fc00c09b49e96a7288fa83d191eb50f8bb2
 
IA-32:
ftp-0.17-51.3.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: 93bb036704795d4891fd7c2677d9ef77
SHA-256: cae52d7c419e520361da046773ed798a60038d2d5b0fec491517535b084051be
ftp-debuginfo-0.17-51.3.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: 5bb2b810965862c06e902c393494ad84
SHA-256: 332692de6f7983ee9b0436d22061e3261d7386681d4fcaa32dda65cbbf2f964b
 
x86_64:
ftp-0.17-51.3.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: e0892dcf047ad25ac6c6b29fe02310fd
SHA-256: 73949d49a205d164fad1f4fe0078c5e15929b0730d7f6bec12d5cb6709b419b3
ftp-debuginfo-0.17-51.3.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: eff0e307ca67d69f6d765209cf226cd7
SHA-256: cdb93e45e059746a796db37a13f5b999fd6335e5a0c1fb987a48ca846427537f
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

ftp


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/