Bug Fix Advisory ftp bug fix update

Advisory: RHBA-2013:0845-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-05-21
Last updated on: 2013-11-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated ftp packages that fix one bug are now available for Red Hat Enterprise
Linux 6.

The ftp packages provide the standard UNIX command-line File Transfer Protocol
(FTP) client. FTP is a widely used protocol for transferring files over the
Internet, and for archiving files.

This update fixes the following bug:

* Prior to this update, when the FTP client was used from a shell with elevated
permissions (through the su or the sudo utility), it incorrectly assumed the UID
from the original login, instead of the user initiating the client.
Consequently, the local home directory was incorrect. With this update, the
underlying code has been modified to correctly get the login credentials using
the getpwuid(3) utility function call. Now, the local home directory is set
according to the user running the client. (BZ#861113)

All users of ftp are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
ftp-0.17-54.el6.src.rpm     MD5: 261e673489222d498b532d0e8670fc86
SHA-256: db004b88f53ac80330bd812040b696e9d4a9fff9ee8302d07400d60683089bf5
 
IA-32:
ftp-0.17-54.el6.i686.rpm     MD5: 4ae43107b45aeabeb67adaea3e03352b
SHA-256: c16a6641e5700cf7b64b300a84e4cc7fc969ab0b08f43a0657c0c7f3f19ced0f
ftp-debuginfo-0.17-54.el6.i686.rpm     MD5: 89274e589ab05c7b3a6205874e3e5e5a
SHA-256: e96d79feabea29ac26f3a37bcea666ef7a71c4fec44702d7ab160d51178c5894
 
x86_64:
ftp-0.17-54.el6.x86_64.rpm     MD5: e7186674d38a6ead1b7046d147565dc7
SHA-256: 297ddbbc6f7ed9b75e051240154c125a4cc1bb36868d9678ebdd7aa269174b8a
ftp-debuginfo-0.17-54.el6.x86_64.rpm     MD5: 2d1258b56f23ce211e77761ff2fe3294
SHA-256: 0b350c9e0215ffd3c4eb3ee4f4de94d6413b055f8ea40ddb9ad68b620860bcf8
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
ftp-0.17-54.el6.src.rpm     MD5: 261e673489222d498b532d0e8670fc86
SHA-256: db004b88f53ac80330bd812040b696e9d4a9fff9ee8302d07400d60683089bf5
 
x86_64:
ftp-0.17-54.el6.x86_64.rpm     MD5: e7186674d38a6ead1b7046d147565dc7
SHA-256: 297ddbbc6f7ed9b75e051240154c125a4cc1bb36868d9678ebdd7aa269174b8a
ftp-debuginfo-0.17-54.el6.x86_64.rpm     MD5: 2d1258b56f23ce211e77761ff2fe3294
SHA-256: 0b350c9e0215ffd3c4eb3ee4f4de94d6413b055f8ea40ddb9ad68b620860bcf8
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
ftp-0.17-54.el6.src.rpm     MD5: 261e673489222d498b532d0e8670fc86
SHA-256: db004b88f53ac80330bd812040b696e9d4a9fff9ee8302d07400d60683089bf5
 
IA-32:
ftp-0.17-54.el6.i686.rpm     MD5: 4ae43107b45aeabeb67adaea3e03352b
SHA-256: c16a6641e5700cf7b64b300a84e4cc7fc969ab0b08f43a0657c0c7f3f19ced0f
ftp-debuginfo-0.17-54.el6.i686.rpm     MD5: 89274e589ab05c7b3a6205874e3e5e5a
SHA-256: e96d79feabea29ac26f3a37bcea666ef7a71c4fec44702d7ab160d51178c5894
 
PPC:
ftp-0.17-54.el6.ppc64.rpm     MD5: 96e2386c3c6dc96a257d8374fbd9a3be
SHA-256: 8137c10d6af7fffbb03ab2ced5471fde87dbfd044db3d291a5585d02507de13d
ftp-debuginfo-0.17-54.el6.ppc64.rpm     MD5: 5b2ed9eed0952b97e66c2fbcf87c5103
SHA-256: 0c12fc21623aeb8c9dec88701777d1e517b26d6c352fd6e6f28a10d1029bf79e
 
s390x:
ftp-0.17-54.el6.s390x.rpm     MD5: 405c1267cff5774efa337b1a94a6a9ba
SHA-256: abfc9818da732f1cbc03a0b7b7fea5e0833ee1a6edb3e07ea7a57be6f363527b
ftp-debuginfo-0.17-54.el6.s390x.rpm     MD5: ccbc491a1a63babac7df59696348aef7
SHA-256: 4292be9723af08b01b2b46d8ebe17123e13d09ccac1e1e5dc55576ac6061e49b
 
x86_64:
ftp-0.17-54.el6.x86_64.rpm     MD5: e7186674d38a6ead1b7046d147565dc7
SHA-256: 297ddbbc6f7ed9b75e051240154c125a4cc1bb36868d9678ebdd7aa269174b8a
ftp-debuginfo-0.17-54.el6.x86_64.rpm     MD5: 2d1258b56f23ce211e77761ff2fe3294
SHA-256: 0b350c9e0215ffd3c4eb3ee4f4de94d6413b055f8ea40ddb9ad68b620860bcf8
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
ftp-0.17-54.el6.src.rpm     MD5: 261e673489222d498b532d0e8670fc86
SHA-256: db004b88f53ac80330bd812040b696e9d4a9fff9ee8302d07400d60683089bf5
 
IA-32:
ftp-0.17-54.el6.i686.rpm     MD5: 4ae43107b45aeabeb67adaea3e03352b
SHA-256: c16a6641e5700cf7b64b300a84e4cc7fc969ab0b08f43a0657c0c7f3f19ced0f
ftp-debuginfo-0.17-54.el6.i686.rpm     MD5: 89274e589ab05c7b3a6205874e3e5e5a
SHA-256: e96d79feabea29ac26f3a37bcea666ef7a71c4fec44702d7ab160d51178c5894
 
x86_64:
ftp-0.17-54.el6.x86_64.rpm     MD5: e7186674d38a6ead1b7046d147565dc7
SHA-256: 297ddbbc6f7ed9b75e051240154c125a4cc1bb36868d9678ebdd7aa269174b8a
ftp-debuginfo-0.17-54.el6.x86_64.rpm     MD5: 2d1258b56f23ce211e77761ff2fe3294
SHA-256: 0b350c9e0215ffd3c4eb3ee4f4de94d6413b055f8ea40ddb9ad68b620860bcf8
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

861113 - FTP client does not expand home directory correctly after sudo or su


Keywords

ftp


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/