Skip to navigation

Enhancement Advisory ftp enhancement update

Advisory: RHEA-2013:0102-1
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated ftp packages that add one enhancement are now available for Red Hat
Enterprise Linux 5.

The ftp package provides the standard UNIX command line File Transfer Protocol
(FTP) client. FTP is a widely used protocol for transferring files over the
Internet, and for archiving files.

This update adds the following enhancement:

* Previously, the command line width in the ftp client was limited to 200
characters. With this update, the maximum possible length of the FTP command
line is extended to 4296 characters. (BZ#665240)

All users of ftp are advised to upgrade to these updated packages, which add
this enhancement.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
ftp-0.17-38.el5.src.rpm     MD5: 933d6da26549beda2ada61f6e7d7ea38
SHA-256: d4e1bc67727d94a195d10bd2a031041de71c4ef9dfca2780218eecb44d268624
 
IA-32:
ftp-0.17-38.el5.i386.rpm     MD5: 931fc57b59e46ee9041e7849ed932d71
SHA-256: 128ab3a51eca8d28926cb694c2afa0ba6e8c539213a10f5d4502f44efc02741b
ftp-debuginfo-0.17-38.el5.i386.rpm     MD5: 88a0bc66b46e839cf0bb7194ffc5d79b
SHA-256: e331a7d147cd6bd7a3a45ebdfd5ca9f546d20dfad9fe23b21e54b580a4c1bfb2
 
IA-64:
ftp-0.17-38.el5.ia64.rpm     MD5: 1e3bd32499b5812573347b9e6612f8c5
SHA-256: 0f13b627bb7d3c74340782714d7307c77b56a75c12dca534ca95382d2dc25f6f
ftp-debuginfo-0.17-38.el5.ia64.rpm     MD5: 42c69f7d720b586ce4b7291b7f2edeaf
SHA-256: 857931b9f6827f0de118ad0c60694dbcace69731e01613e16dba99036761f3e7
 
PPC:
ftp-0.17-38.el5.ppc.rpm     MD5: 8cd6d1de103b4f51a7a219897babf7b2
SHA-256: a923f6759b9a7aae6d7bbf7d9b6ec9f3fdd785b2a169ed534131ac0286156ae8
ftp-debuginfo-0.17-38.el5.ppc.rpm     MD5: d8793a3ad7cf040c2388210ce9f6a34b
SHA-256: b12f35ac7cc59cd3f7f70eed2e40835d4ba43359b652a801069c635ab75c6ec7
 
s390x:
ftp-0.17-38.el5.s390x.rpm     MD5: dbfe08c8a73e041c720579f57a1ae34d
SHA-256: c63c90cdcbbcbf3521b15c5b4dbc3c5fc8e9ecb2e1793475cba3a37d1a9b6ae6
ftp-debuginfo-0.17-38.el5.s390x.rpm     MD5: cbf856c56c2564b12ee21fbf50e6544d
SHA-256: 5861bdadda2407ac2dbdd31378e902b0a358aa700a43798df2fdfd96dcf08d02
 
x86_64:
ftp-0.17-38.el5.x86_64.rpm     MD5: 236ccb1a7f03f6e4d001718bdb9895d6
SHA-256: 04c2cae8bbfc8af17656c832db4534a1272a4f63859b1fd1ad5d425dcfe36cc1
ftp-debuginfo-0.17-38.el5.x86_64.rpm     MD5: b5c45a06ba7333dd89951e795a00a45a
SHA-256: a84daed1865e3a49d39bc91031bf65377e5ae37cf4b34be485beb60bdeefe1aa
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
ftp-0.17-38.el5.src.rpm     MD5: 933d6da26549beda2ada61f6e7d7ea38
SHA-256: d4e1bc67727d94a195d10bd2a031041de71c4ef9dfca2780218eecb44d268624
 
IA-32:
ftp-0.17-38.el5.i386.rpm     MD5: 931fc57b59e46ee9041e7849ed932d71
SHA-256: 128ab3a51eca8d28926cb694c2afa0ba6e8c539213a10f5d4502f44efc02741b
ftp-debuginfo-0.17-38.el5.i386.rpm     MD5: 88a0bc66b46e839cf0bb7194ffc5d79b
SHA-256: e331a7d147cd6bd7a3a45ebdfd5ca9f546d20dfad9fe23b21e54b580a4c1bfb2
 
x86_64:
ftp-0.17-38.el5.x86_64.rpm     MD5: 236ccb1a7f03f6e4d001718bdb9895d6
SHA-256: 04c2cae8bbfc8af17656c832db4534a1272a4f63859b1fd1ad5d425dcfe36cc1
ftp-debuginfo-0.17-38.el5.x86_64.rpm     MD5: b5c45a06ba7333dd89951e795a00a45a
SHA-256: a84daed1865e3a49d39bc91031bf65377e5ae37cf4b34be485beb60bdeefe1aa
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

665240 - [RFE] Increase the command line length limit of the FTP client beyond 200 characters.



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/