Skip to navigation

Bug Fix Advisory ftp bug fix update

Advisory: RHBA-2012:1444-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-11-09
Last updated on: 2013-02-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated ftp packages that fix one bug are now available for Red Hat Enterprise
Linux 6.

The ftp packages provide the standard UNIX command line File Transfer Protocol
(FTP) client. FTP is a widely used protocol for transferring files over the
Internet, and for archiving files.

This update fixes the following bugs:

* Prior to this update, the ftp client could encounter a buffer overflow and
aborted if a macro longer than 200 characters was defined and then used after a
connection. This update modifies the underlying code and the buffer that holds
memory for the macro name was extended. Now, ftp matches the length of the
command line limit and the ftp client no longer aborts when a macro with a long
name is executed. (BZ#869858)

All users of ftp are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
ftp-0.17-53.el6.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 39364b17243be20595b179980fdf5e6d
SHA-256: fcdad7beeed92b118cdb134344bf71533273a8587c400df27ed8287c838ce3ce
 
IA-32:
ftp-0.17-53.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: 6296f495aa4fa653763c6ee56b2f2895
SHA-256: 53636c1a7341887ae5b6471d5b08764b7ac8e58cc5da7a6878a6a9ae63440614
ftp-debuginfo-0.17-53.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: b8cdbf23a9319617017e6475d3c6a2f9
SHA-256: 1f44e40e9eef651ac3bf41c1d4ffb9211934e2a25cf6669bd98c2d92f9482068
 
x86_64:
ftp-0.17-53.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 0564aa54806461c895a2c09d66effab3
SHA-256: 9003216dbac9ac94546d2b2834e7941969e19bfcd68245e7eda1521c9e378579
ftp-debuginfo-0.17-53.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: c3029d3e73e7d9b739935697b5f2c10f
SHA-256: 9c8bc2fba34374b39349365b3c12f1d24a2a669bc15311b0419b54a379deca3d
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
ftp-0.17-53.el6.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 39364b17243be20595b179980fdf5e6d
SHA-256: fcdad7beeed92b118cdb134344bf71533273a8587c400df27ed8287c838ce3ce
 
x86_64:
ftp-0.17-53.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 0564aa54806461c895a2c09d66effab3
SHA-256: 9003216dbac9ac94546d2b2834e7941969e19bfcd68245e7eda1521c9e378579
ftp-debuginfo-0.17-53.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: c3029d3e73e7d9b739935697b5f2c10f
SHA-256: 9c8bc2fba34374b39349365b3c12f1d24a2a669bc15311b0419b54a379deca3d
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
ftp-0.17-53.el6.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 39364b17243be20595b179980fdf5e6d
SHA-256: fcdad7beeed92b118cdb134344bf71533273a8587c400df27ed8287c838ce3ce
 
IA-32:
ftp-0.17-53.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: 6296f495aa4fa653763c6ee56b2f2895
SHA-256: 53636c1a7341887ae5b6471d5b08764b7ac8e58cc5da7a6878a6a9ae63440614
ftp-debuginfo-0.17-53.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: b8cdbf23a9319617017e6475d3c6a2f9
SHA-256: 1f44e40e9eef651ac3bf41c1d4ffb9211934e2a25cf6669bd98c2d92f9482068
 
PPC:
ftp-0.17-53.el6.ppc64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 469822b68b6b945a3608ebab8e92c67a
SHA-256: e3c84fda1eadf7a44fa2faa3246d2e7741270da1db0da03734841e96095cd3f2
ftp-debuginfo-0.17-53.el6.ppc64.rpm
File outdated by:  RHBA-2013:0845
    MD5: c3e4e55796f0e18747278fef57ce9e77
SHA-256: 74fd271aae95053a73ce9b486a8bb1b3d803ec9988d8a083063f6f03d79794f8
 
s390x:
ftp-0.17-53.el6.s390x.rpm
File outdated by:  RHBA-2013:0845
    MD5: 04dc2698a425f2d87fc224a8298ec1ce
SHA-256: aa1fb38ac91e9b6c21eeea9e16a672f717eea115a9424ba0e8de51c4083e61c1
ftp-debuginfo-0.17-53.el6.s390x.rpm
File outdated by:  RHBA-2013:0845
    MD5: acb7e34e3b15b3c496ee520b87db6470
SHA-256: 1000758783f8cd071bb61c386ccc66540b2a536d8f4e6936fb9245065761bfbb
 
x86_64:
ftp-0.17-53.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 0564aa54806461c895a2c09d66effab3
SHA-256: 9003216dbac9ac94546d2b2834e7941969e19bfcd68245e7eda1521c9e378579
ftp-debuginfo-0.17-53.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: c3029d3e73e7d9b739935697b5f2c10f
SHA-256: 9c8bc2fba34374b39349365b3c12f1d24a2a669bc15311b0419b54a379deca3d
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
ftp-0.17-53.el6.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 39364b17243be20595b179980fdf5e6d
SHA-256: fcdad7beeed92b118cdb134344bf71533273a8587c400df27ed8287c838ce3ce
 
IA-32:
ftp-0.17-53.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: 6296f495aa4fa653763c6ee56b2f2895
SHA-256: 53636c1a7341887ae5b6471d5b08764b7ac8e58cc5da7a6878a6a9ae63440614
ftp-debuginfo-0.17-53.el6.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: b8cdbf23a9319617017e6475d3c6a2f9
SHA-256: 1f44e40e9eef651ac3bf41c1d4ffb9211934e2a25cf6669bd98c2d92f9482068
 
x86_64:
ftp-0.17-53.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 0564aa54806461c895a2c09d66effab3
SHA-256: 9003216dbac9ac94546d2b2834e7941969e19bfcd68245e7eda1521c9e378579
ftp-debuginfo-0.17-53.el6.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: c3029d3e73e7d9b739935697b5f2c10f
SHA-256: 9c8bc2fba34374b39349365b3c12f1d24a2a669bc15311b0419b54a379deca3d
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

ftp


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/