Skip to navigation

Bug Fix Advisory ftp bug fix and enhancement update

Advisory: RHBA-2012:1452-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-11-12
Last updated on: 2012-11-12
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated ftp packages that two bugs and add one enhancement are now available for
Red Hat Enterprise Linux 6.

The ftp packages provide the standard UNIX command line File Transfer Protocol
(FTP) client. FTP is a widely used protocol for transferring files over the
Internet, and for archiving files.

This update fixes the following bugs:

* Previous implementation of FTP did not free the memory allocated for its
commands correctly. Consequently, memory leaks occurred whenever the "append",
"put" and "send" commands were run. With this update, the underlying source code
has been corrected and allocated memory is now freed as expected. (BZ#871072)

* Previously, the size of the buffer used for an FTP macro definition was
limited to 200 characters. Therefore, if the size of the macro was larger than
200 characters, the buffer overflowed and the FTP client terminated
unexpectedly. This update extends the buffer of the FTP macro to match the size
of the FTP command line limit, which is now 4296 characters. The FTP client no
longer crashes in this scenario. (BZ#871547)

Additionally, this update adds the following enhancement:

* Previously, the command line width in the FTP client was limited to 200
characters. With this update, the maximum possible length of the FTP command
line has been extended to 4296 characters. (BZ#871060)

All users of ftp are advised to upgrade to these updated packages, which fix
these bugs and add this enhancement.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
ftp-0.17-51.1.el6_3.1.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 6f8b87cbd654455618c0fb27aab74658
SHA-256: 89c086b6b97b2808ed8157d2689a5b45325f31ff9033649fa0aec39c0a01c71b
 
IA-32:
ftp-0.17-51.1.el6_3.1.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: 793f20d3b08f08f875a95e26dc822c18
SHA-256: 6d0001aece7da3fae14628f95e3a595d0fa422bffe3a10624fe8d614e39805a8
ftp-debuginfo-0.17-51.1.el6_3.1.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: d46bfee7f3e14c5bc9dea57cda8d757d
SHA-256: e90ddcdb9ea374bae96b54b6bf3ca568f23ae28cd21602f04997499dcb3fd92a
 
x86_64:
ftp-0.17-51.1.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 5315248d59d46058f1ee2e8dc3ad411b
SHA-256: 8d344b3f7edb82438f28bde39d2e632709bfb1db6e22ffe224ae6ee5d0ae737e
ftp-debuginfo-0.17-51.1.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 0ce3be24c20c2a0e648d5e8d6d2f35da
SHA-256: 01ed8980c6c98961234d9c297fce9e1018de75d7c66f14f3726692780afb5077
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
ftp-0.17-51.1.el6_3.1.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 6f8b87cbd654455618c0fb27aab74658
SHA-256: 89c086b6b97b2808ed8157d2689a5b45325f31ff9033649fa0aec39c0a01c71b
 
x86_64:
ftp-0.17-51.1.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 5315248d59d46058f1ee2e8dc3ad411b
SHA-256: 8d344b3f7edb82438f28bde39d2e632709bfb1db6e22ffe224ae6ee5d0ae737e
ftp-debuginfo-0.17-51.1.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 0ce3be24c20c2a0e648d5e8d6d2f35da
SHA-256: 01ed8980c6c98961234d9c297fce9e1018de75d7c66f14f3726692780afb5077
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
ftp-0.17-51.1.el6_3.1.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 6f8b87cbd654455618c0fb27aab74658
SHA-256: 89c086b6b97b2808ed8157d2689a5b45325f31ff9033649fa0aec39c0a01c71b
 
IA-32:
ftp-0.17-51.1.el6_3.1.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: 793f20d3b08f08f875a95e26dc822c18
SHA-256: 6d0001aece7da3fae14628f95e3a595d0fa422bffe3a10624fe8d614e39805a8
ftp-debuginfo-0.17-51.1.el6_3.1.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: d46bfee7f3e14c5bc9dea57cda8d757d
SHA-256: e90ddcdb9ea374bae96b54b6bf3ca568f23ae28cd21602f04997499dcb3fd92a
 
PPC:
ftp-0.17-51.1.el6_3.1.ppc64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 2f50329c105696a590f9c728a3b1b1c6
SHA-256: 2adbbff07ee4d9a57f92169f58cba381e1d4b5dc78c82c990f6066018612027f
ftp-debuginfo-0.17-51.1.el6_3.1.ppc64.rpm
File outdated by:  RHBA-2013:0845
    MD5: aa817b1fc09479cf05eec97d133425da
SHA-256: baf8dd0c9f6bff87ce391922de1615a04ac165762748f8f0e8a1b879c9cf392a
 
s390x:
ftp-0.17-51.1.el6_3.1.s390x.rpm
File outdated by:  RHBA-2013:0845
    MD5: e7f759f33ffb8eb0ea1c3bcaead16c54
SHA-256: 4fe24fa3b0c4e8321af58e4a57e0e4c9f477c72ca4246c23b645789eafe3373a
ftp-debuginfo-0.17-51.1.el6_3.1.s390x.rpm
File outdated by:  RHBA-2013:0845
    MD5: 513e0db4f1c00df86fa6ac928f59bf1e
SHA-256: c7b769c3f035b7b45576cb017f3d1b5ce9ed07e534dc6ae639b2f3b99001ab93
 
x86_64:
ftp-0.17-51.1.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 5315248d59d46058f1ee2e8dc3ad411b
SHA-256: 8d344b3f7edb82438f28bde39d2e632709bfb1db6e22ffe224ae6ee5d0ae737e
ftp-debuginfo-0.17-51.1.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 0ce3be24c20c2a0e648d5e8d6d2f35da
SHA-256: 01ed8980c6c98961234d9c297fce9e1018de75d7c66f14f3726692780afb5077
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
ftp-0.17-51.1.el6_3.1.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 6f8b87cbd654455618c0fb27aab74658
SHA-256: 89c086b6b97b2808ed8157d2689a5b45325f31ff9033649fa0aec39c0a01c71b
 
IA-32:
ftp-0.17-51.1.el6_3.1.i686.rpm     MD5: 793f20d3b08f08f875a95e26dc822c18
SHA-256: 6d0001aece7da3fae14628f95e3a595d0fa422bffe3a10624fe8d614e39805a8
ftp-debuginfo-0.17-51.1.el6_3.1.i686.rpm     MD5: d46bfee7f3e14c5bc9dea57cda8d757d
SHA-256: e90ddcdb9ea374bae96b54b6bf3ca568f23ae28cd21602f04997499dcb3fd92a
 
PPC:
ftp-0.17-51.1.el6_3.1.ppc64.rpm     MD5: 2f50329c105696a590f9c728a3b1b1c6
SHA-256: 2adbbff07ee4d9a57f92169f58cba381e1d4b5dc78c82c990f6066018612027f
ftp-debuginfo-0.17-51.1.el6_3.1.ppc64.rpm     MD5: aa817b1fc09479cf05eec97d133425da
SHA-256: baf8dd0c9f6bff87ce391922de1615a04ac165762748f8f0e8a1b879c9cf392a
 
s390x:
ftp-0.17-51.1.el6_3.1.s390x.rpm     MD5: e7f759f33ffb8eb0ea1c3bcaead16c54
SHA-256: 4fe24fa3b0c4e8321af58e4a57e0e4c9f477c72ca4246c23b645789eafe3373a
ftp-debuginfo-0.17-51.1.el6_3.1.s390x.rpm     MD5: 513e0db4f1c00df86fa6ac928f59bf1e
SHA-256: c7b769c3f035b7b45576cb017f3d1b5ce9ed07e534dc6ae639b2f3b99001ab93
 
x86_64:
ftp-0.17-51.1.el6_3.1.x86_64.rpm     MD5: 5315248d59d46058f1ee2e8dc3ad411b
SHA-256: 8d344b3f7edb82438f28bde39d2e632709bfb1db6e22ffe224ae6ee5d0ae737e
ftp-debuginfo-0.17-51.1.el6_3.1.x86_64.rpm     MD5: 0ce3be24c20c2a0e648d5e8d6d2f35da
SHA-256: 01ed8980c6c98961234d9c297fce9e1018de75d7c66f14f3726692780afb5077
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
ftp-0.17-51.1.el6_3.1.src.rpm
File outdated by:  RHBA-2013:0845
    MD5: 6f8b87cbd654455618c0fb27aab74658
SHA-256: 89c086b6b97b2808ed8157d2689a5b45325f31ff9033649fa0aec39c0a01c71b
 
IA-32:
ftp-0.17-51.1.el6_3.1.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: 793f20d3b08f08f875a95e26dc822c18
SHA-256: 6d0001aece7da3fae14628f95e3a595d0fa422bffe3a10624fe8d614e39805a8
ftp-debuginfo-0.17-51.1.el6_3.1.i686.rpm
File outdated by:  RHBA-2013:0845
    MD5: d46bfee7f3e14c5bc9dea57cda8d757d
SHA-256: e90ddcdb9ea374bae96b54b6bf3ca568f23ae28cd21602f04997499dcb3fd92a
 
x86_64:
ftp-0.17-51.1.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 5315248d59d46058f1ee2e8dc3ad411b
SHA-256: 8d344b3f7edb82438f28bde39d2e632709bfb1db6e22ffe224ae6ee5d0ae737e
ftp-debuginfo-0.17-51.1.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:0845
    MD5: 0ce3be24c20c2a0e648d5e8d6d2f35da
SHA-256: 01ed8980c6c98961234d9c297fce9e1018de75d7c66f14f3726692780afb5077
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

ftp


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/