Skip to navigation

Bug Fix Advisory ftp bug fix update

Advisory: RHBA-2012:1354-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-10-10
Last updated on: 2013-02-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated ftp packages that fix four bugs are now available for Red Hat Enterprise
Linux 6.

The ftp packages provide the standard UNIX command line File Transfer Protocol
(FTP) client. FTP is a widely used protocol for transferring files over the
Internet, and for archiving files.

This update fixes the following bugs:

* Previously, the command line width in the ftp client was limited to 200
characters. With this update, the maximum possible length of the FTP command
line is extended to 4296 characters. (BZ#665337)

* Prior to this update, "append", "put", and "send" commands were causing system
memory to leak. The memory holding the ftp command was not freed appropriately.
With this update, the underlying source code has been improved to correctly free
the system resources and the memory leaks are no longer present. (BZ#786004)

* Previously, the ftp client could not be invoked to run directly in the active
mode. This functionality has been added to the source code and documented in the
manual page. The client can now be executed with an additional "-A" command line
parameter and will run in the active mode. (BZ#849940)

* Previously, the ftp client hung up when the ftp-data port (20) was not
available (e.g. was blocked). The client then had to be terminated manually.
Additional logic has been added to the source code. With this update, ftp has an
internal timeout set to 30 seconds. If there is no answer from the server when
this time has passed, ftp will now gracefully time out and not hang up.
(BZ#852636)

All users of ftp are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
ftp-0.17-52.el6.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 15cab36f8b6ce604fb13e9e21471e170
SHA-256: 200415397c9cae2a65f3d898436647f5658a047ace8a02091d191432bc44f00f
 
IA-32:
ftp-0.17-52.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: afbb762ed51b180c98633cf7dd3edec5
SHA-256: d31077f6995be7e0a4ac8e49f7f102dd791d987aa178b3f9003f8d63b431e44e
ftp-debuginfo-0.17-52.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: d7cf2bcb1c8e859abab4f4d2a4dc140d
SHA-256: 8ff34b21dec03d89659afb179a4a7de43684e2b5317fdfcddc2af2da21a09031
 
x86_64:
ftp-0.17-52.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: cb8b7866ae9a7189a308bc17e1d0694c
SHA-256: d7e8ebc4a4bf27807ac39ffce24bbc15dc0429367c1ee73dd5ee6eb780a51d7e
ftp-debuginfo-0.17-52.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 055618b3cf7df112f44dc430b46b8abd
SHA-256: 7fab203bdf7be353c5444469054b38737b20bd7640ded5c1ff32f086646c09df
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
ftp-0.17-52.el6.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 15cab36f8b6ce604fb13e9e21471e170
SHA-256: 200415397c9cae2a65f3d898436647f5658a047ace8a02091d191432bc44f00f
 
x86_64:
ftp-0.17-52.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: cb8b7866ae9a7189a308bc17e1d0694c
SHA-256: d7e8ebc4a4bf27807ac39ffce24bbc15dc0429367c1ee73dd5ee6eb780a51d7e
ftp-debuginfo-0.17-52.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 055618b3cf7df112f44dc430b46b8abd
SHA-256: 7fab203bdf7be353c5444469054b38737b20bd7640ded5c1ff32f086646c09df
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
ftp-0.17-52.el6.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 15cab36f8b6ce604fb13e9e21471e170
SHA-256: 200415397c9cae2a65f3d898436647f5658a047ace8a02091d191432bc44f00f
 
IA-32:
ftp-0.17-52.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: afbb762ed51b180c98633cf7dd3edec5
SHA-256: d31077f6995be7e0a4ac8e49f7f102dd791d987aa178b3f9003f8d63b431e44e
ftp-debuginfo-0.17-52.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: d7cf2bcb1c8e859abab4f4d2a4dc140d
SHA-256: 8ff34b21dec03d89659afb179a4a7de43684e2b5317fdfcddc2af2da21a09031
 
PPC:
ftp-0.17-52.el6.ppc64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 4581225dc6eab03332b070d5e58cde8d
SHA-256: 4ff9ca838b60b18acd25094d1c0cf37d11010fa79294f9f20e408250299bdce9
ftp-debuginfo-0.17-52.el6.ppc64.rpm
File outdated by:  RHBA-2013:0845
    MD5: f904aca99767d85701448ff2a86723f4
SHA-256: 64259a367938ce887c4f2c3c418dee100c129dfbeca54c206be1c06670815570
 
s390x:
ftp-0.17-52.el6.s390x.rpm
File outdated by:  RHBA-2013:0845
    MD5: 2f40120223bb1f23dc3fc3955489e17a
SHA-256: 03d2aa24cbb7b404d47d6fefee817c3dfbb7c158253998d06f474f41e9074ed2
ftp-debuginfo-0.17-52.el6.s390x.rpm
File outdated by:  RHBA-2013:0845
    MD5: df944b4d233f6aeeb3133ed1c6d52b2c
SHA-256: d887393487fa33f0c3b50a290dd5f83306a3687883737356b67b0a201130a841
 
x86_64:
ftp-0.17-52.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: cb8b7866ae9a7189a308bc17e1d0694c
SHA-256: d7e8ebc4a4bf27807ac39ffce24bbc15dc0429367c1ee73dd5ee6eb780a51d7e
ftp-debuginfo-0.17-52.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 055618b3cf7df112f44dc430b46b8abd
SHA-256: 7fab203bdf7be353c5444469054b38737b20bd7640ded5c1ff32f086646c09df
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
ftp-0.17-52.el6.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 15cab36f8b6ce604fb13e9e21471e170
SHA-256: 200415397c9cae2a65f3d898436647f5658a047ace8a02091d191432bc44f00f
 
IA-32:
ftp-0.17-52.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: afbb762ed51b180c98633cf7dd3edec5
SHA-256: d31077f6995be7e0a4ac8e49f7f102dd791d987aa178b3f9003f8d63b431e44e
ftp-debuginfo-0.17-52.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: d7cf2bcb1c8e859abab4f4d2a4dc140d
SHA-256: 8ff34b21dec03d89659afb179a4a7de43684e2b5317fdfcddc2af2da21a09031
 
x86_64:
ftp-0.17-52.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: cb8b7866ae9a7189a308bc17e1d0694c
SHA-256: d7e8ebc4a4bf27807ac39ffce24bbc15dc0429367c1ee73dd5ee6eb780a51d7e
ftp-debuginfo-0.17-52.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 055618b3cf7df112f44dc430b46b8abd
SHA-256: 7fab203bdf7be353c5444469054b38737b20bd7640ded5c1ff32f086646c09df
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

849940 - ftp client does not support active mode from command line invocation


Keywords

ftp


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/