Skip to navigation

Bug Fix Advisory vsftpd bug fix update

Advisory: RHBA-2013:0263-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-02-18
Last updated on: 2013-02-18
Affected Products: Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated vsftpd package that fixes one bug is now available for Red Hat
Enterprise Linux 6.

The vsftpd package includes a Very Secure File Transfer Protocol (FTP) daemon,
which is used to serve files over a network.

This update fixes the following bug:

* The vsftpd daemon supports FTP clients that provide the set of commands
"proxy ftp-command". These commands provide the ability to transfer data from
one server to another through FTP client. Previously, the vsftpd version failed
to establish data connections to another server opened with the "proxy get
[file]" command and sent the data connection request to the client instead. With
this update, the vsftpd version is able to establish data connections to another
FTP server using the "proxy get [file]" command. (BZ#910371)

Users of vsftpd are advised to upgrade to this updated package, which fixes this
bug. The vsftpd daemon must be restarted for this update to take effect.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Server (v. 6)

SRPMS:
vsftpd-2.2.2-11.el6_3.1.src.rpm
File outdated by:  RHBA-2013:0573
    MD5: 14f5408a01a7e6fa7113ae3b76134a05
SHA-256: 2be4f1d75b9991fbe4c7c5f0beeb56f14a85b3edf9e65d20deedf8106a2e4260
 
IA-32:
vsftpd-2.2.2-11.el6_3.1.i686.rpm
File outdated by:  RHBA-2013:0573
    MD5: 60005c07086f60f73f069d20e193deff
SHA-256: d06483be3a9768531306163a0d10b4fac051e8d16d936cc255705431837438bf
vsftpd-debuginfo-2.2.2-11.el6_3.1.i686.rpm
File outdated by:  RHBA-2013:0573
    MD5: 4e79ca00d94c903c7104b2548dd9d3d1
SHA-256: 9f6c9d7ae934065617cdc0e92ff576865adaad534e7ff83e6ec4d2e507efe132
 
PPC:
vsftpd-2.2.2-11.el6_3.1.ppc64.rpm
File outdated by:  RHBA-2013:0573
    MD5: 7db75b21b2849d4bf3cb53bb48753b34
SHA-256: 54251f6121bf9af1a2cc4a635d89b16bc6115384f54d6c23a9a0a373e4ab1d1d
vsftpd-debuginfo-2.2.2-11.el6_3.1.ppc64.rpm
File outdated by:  RHBA-2013:0573
    MD5: 3bcb98f7a576a420bd9c31a58bd87f65
SHA-256: 8368e4308023ed6411b035d8e9d8085b26a73ba3894dd9b299e1558cdf6ce24a
 
s390x:
vsftpd-2.2.2-11.el6_3.1.s390x.rpm
File outdated by:  RHBA-2013:0573
    MD5: 2e0e6377c1340857004ec85db5631a4a
SHA-256: 54bf72f696cfa359af25ddf439c1fc5af41ac100ce707da5c57f00747d3558f2
vsftpd-debuginfo-2.2.2-11.el6_3.1.s390x.rpm
File outdated by:  RHBA-2013:0573
    MD5: 50f66d49c43fda7a601be1df5d627ef1
SHA-256: 9ffecc9b2565d4fccf015422d1a43b61e111eac9c71b23a80d7202d26d63a968
 
x86_64:
vsftpd-2.2.2-11.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:0573
    MD5: d064e93dc58c8f4124e0330d54a8ebe1
SHA-256: 11564643d81ddd7f47fed57724fa319d3ccc02a7e3065c7604bd36250e5e5062
vsftpd-debuginfo-2.2.2-11.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:0573
    MD5: c849d25d0333ac20c0c922d9e5e0cdd1
SHA-256: 104e2d25e45e5f635f3082eddb304150db1232d235591664aeff64d22b768146
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
vsftpd-2.2.2-11.el6_3.1.src.rpm
File outdated by:  RHBA-2013:0573
    MD5: 14f5408a01a7e6fa7113ae3b76134a05
SHA-256: 2be4f1d75b9991fbe4c7c5f0beeb56f14a85b3edf9e65d20deedf8106a2e4260
 
IA-32:
vsftpd-2.2.2-11.el6_3.1.i686.rpm     MD5: 60005c07086f60f73f069d20e193deff
SHA-256: d06483be3a9768531306163a0d10b4fac051e8d16d936cc255705431837438bf
vsftpd-debuginfo-2.2.2-11.el6_3.1.i686.rpm     MD5: 4e79ca00d94c903c7104b2548dd9d3d1
SHA-256: 9f6c9d7ae934065617cdc0e92ff576865adaad534e7ff83e6ec4d2e507efe132
 
PPC:
vsftpd-2.2.2-11.el6_3.1.ppc64.rpm     MD5: 7db75b21b2849d4bf3cb53bb48753b34
SHA-256: 54251f6121bf9af1a2cc4a635d89b16bc6115384f54d6c23a9a0a373e4ab1d1d
vsftpd-debuginfo-2.2.2-11.el6_3.1.ppc64.rpm     MD5: 3bcb98f7a576a420bd9c31a58bd87f65
SHA-256: 8368e4308023ed6411b035d8e9d8085b26a73ba3894dd9b299e1558cdf6ce24a
 
s390x:
vsftpd-2.2.2-11.el6_3.1.s390x.rpm     MD5: 2e0e6377c1340857004ec85db5631a4a
SHA-256: 54bf72f696cfa359af25ddf439c1fc5af41ac100ce707da5c57f00747d3558f2
vsftpd-debuginfo-2.2.2-11.el6_3.1.s390x.rpm     MD5: 50f66d49c43fda7a601be1df5d627ef1
SHA-256: 9ffecc9b2565d4fccf015422d1a43b61e111eac9c71b23a80d7202d26d63a968
 
x86_64:
vsftpd-2.2.2-11.el6_3.1.x86_64.rpm     MD5: d064e93dc58c8f4124e0330d54a8ebe1
SHA-256: 11564643d81ddd7f47fed57724fa319d3ccc02a7e3065c7604bd36250e5e5062
vsftpd-debuginfo-2.2.2-11.el6_3.1.x86_64.rpm     MD5: c849d25d0333ac20c0c922d9e5e0cdd1
SHA-256: 104e2d25e45e5f635f3082eddb304150db1232d235591664aeff64d22b768146
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
vsftpd-2.2.2-11.el6_3.1.src.rpm
File outdated by:  RHBA-2013:0573
    MD5: 14f5408a01a7e6fa7113ae3b76134a05
SHA-256: 2be4f1d75b9991fbe4c7c5f0beeb56f14a85b3edf9e65d20deedf8106a2e4260
 
IA-32:
vsftpd-2.2.2-11.el6_3.1.i686.rpm
File outdated by:  RHBA-2013:0573
    MD5: 60005c07086f60f73f069d20e193deff
SHA-256: d06483be3a9768531306163a0d10b4fac051e8d16d936cc255705431837438bf
vsftpd-debuginfo-2.2.2-11.el6_3.1.i686.rpm
File outdated by:  RHBA-2013:0573
    MD5: 4e79ca00d94c903c7104b2548dd9d3d1
SHA-256: 9f6c9d7ae934065617cdc0e92ff576865adaad534e7ff83e6ec4d2e507efe132
 
x86_64:
vsftpd-2.2.2-11.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:0573
    MD5: d064e93dc58c8f4124e0330d54a8ebe1
SHA-256: 11564643d81ddd7f47fed57724fa319d3ccc02a7e3065c7604bd36250e5e5062
vsftpd-debuginfo-2.2.2-11.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:0573
    MD5: c849d25d0333ac20c0c922d9e5e0cdd1
SHA-256: 104e2d25e45e5f635f3082eddb304150db1232d235591664aeff64d22b768146
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/