Updated vsftpd packages that fix one bug are now available for Red HatEnterprise Linux 6.

The vsftpd packages include a Very Secure File Transfer Protocol (FTP) daemon,which is used to serve files over a network.This update fixes the following bug:* Prior to this update, the “local_max_rate” option did not work asexpected. As a consequence, the transmission speed was significantly lower.This update extends the types of variables for calculating and accumulatingthe amount of transferred data and postpones the start of evaluation afterthe tenth. (BZ#1147517)Users of vsftpd are advised to upgrade to these updated packages, which fix thisbug. The vsftpd daemon must be restarted for this update to take effect.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Linux Server (v. 6)

SRPMS:
vsftpd-2.2.2-13.el6_6.1.src.rpm
    MD5: 0f7e4ff1de6e0ab76a6c003759644aa3SHA-256: 038937a0817c6a90f7ce28cb732c2e1a5d637257d78d8e94f4221839a3fea193
 
IA-32:
vsftpd-2.2.2-13.el6_6.1.i686.rpm
    MD5: 3e9a104627e4d0d0ec04348c4e0312b9SHA-256: 9d393defe47ebbf92f9f4af41d0b7e09184644ba4c25317c3ed7e5c4fd59f7ab
vsftpd-debuginfo-2.2.2-13.el6_6.1.i686.rpm
    MD5: 606ce975833ebf7306780adea83a444dSHA-256: 5d7e12b525a25ea4cddabe6ee299cc2f1a73b9dbb2aa81c6e7e8b8cb67ecf12e
 
PPC:
vsftpd-2.2.2-13.el6_6.1.ppc64.rpm
    MD5: a5eb4afa7f7d0e4d90dafe4562f31ec9SHA-256: a3ceeb4f3b5150b5bbd1ab74c722aa319f60f62428d7b88cff0ee076c73e209e
vsftpd-debuginfo-2.2.2-13.el6_6.1.ppc64.rpm
    MD5: cab5232186dcac62c96f09291bfb0965SHA-256: a291c94dd39e25711f606aa77bebda764f5f8a8f8ae5d70ae046c7bcf43b4ce6
 
s390x:
vsftpd-2.2.2-13.el6_6.1.s390x.rpm
    MD5: 5ac1f9dadccbc7ef7a5a385dc90fc092SHA-256: 18f657415bf1f73dbb02b42c9997452029dd012bc7a7f3da2837c14153354caa
vsftpd-debuginfo-2.2.2-13.el6_6.1.s390x.rpm
    MD5: 84526b95963f42da7c499f5c5b4c7069SHA-256: 376448c61a5fb59e0a043570ee802563463615b964895daeb5955b4d9f3d1ec7
 
x86_64:
vsftpd-2.2.2-13.el6_6.1.x86_64.rpm
    MD5: bbd8a5fe17c9704446cbfc83bd7e54f4SHA-256: 3b86b9290722fe9e5d7fe415e6f25ea86ffc01e7c8f7ab6c1154d0e74a381602
vsftpd-debuginfo-2.2.2-13.el6_6.1.x86_64.rpm
    MD5: 4ec2bb51b96935b57fc4e49571ca6810SHA-256: da5d414a50a86c87c0427b2fea890b7c9331e1e81c226cdba29e495fbf9563c1
 
Red Hat Enterprise Linux Server EUS (v. 6.6.z)

SRPMS:
vsftpd-2.2.2-13.el6_6.1.src.rpm
    MD5: 0f7e4ff1de6e0ab76a6c003759644aa3SHA-256: 038937a0817c6a90f7ce28cb732c2e1a5d637257d78d8e94f4221839a3fea193
 
IA-32:
vsftpd-2.2.2-13.el6_6.1.i686.rpm
    MD5: 3e9a104627e4d0d0ec04348c4e0312b9SHA-256: 9d393defe47ebbf92f9f4af41d0b7e09184644ba4c25317c3ed7e5c4fd59f7ab
vsftpd-debuginfo-2.2.2-13.el6_6.1.i686.rpm
    MD5: 606ce975833ebf7306780adea83a444dSHA-256: 5d7e12b525a25ea4cddabe6ee299cc2f1a73b9dbb2aa81c6e7e8b8cb67ecf12e
 
PPC:
vsftpd-2.2.2-13.el6_6.1.ppc64.rpm
    MD5: a5eb4afa7f7d0e4d90dafe4562f31ec9SHA-256: a3ceeb4f3b5150b5bbd1ab74c722aa319f60f62428d7b88cff0ee076c73e209e
vsftpd-debuginfo-2.2.2-13.el6_6.1.ppc64.rpm
    MD5: cab5232186dcac62c96f09291bfb0965SHA-256: a291c94dd39e25711f606aa77bebda764f5f8a8f8ae5d70ae046c7bcf43b4ce6
 
s390x:
vsftpd-2.2.2-13.el6_6.1.s390x.rpm
    MD5: 5ac1f9dadccbc7ef7a5a385dc90fc092SHA-256: 18f657415bf1f73dbb02b42c9997452029dd012bc7a7f3da2837c14153354caa
vsftpd-debuginfo-2.2.2-13.el6_6.1.s390x.rpm
    MD5: 84526b95963f42da7c499f5c5b4c7069SHA-256: 376448c61a5fb59e0a043570ee802563463615b964895daeb5955b4d9f3d1ec7
 
x86_64:
vsftpd-2.2.2-13.el6_6.1.x86_64.rpm
    MD5: bbd8a5fe17c9704446cbfc83bd7e54f4SHA-256: 3b86b9290722fe9e5d7fe415e6f25ea86ffc01e7c8f7ab6c1154d0e74a381602
vsftpd-debuginfo-2.2.2-13.el6_6.1.x86_64.rpm
    MD5: 4ec2bb51b96935b57fc4e49571ca6810SHA-256: da5d414a50a86c87c0427b2fea890b7c9331e1e81c226cdba29e495fbf9563c1
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
vsftpd-2.2.2-13.el6_6.1.src.rpm
    MD5: 0f7e4ff1de6e0ab76a6c003759644aa3SHA-256: 038937a0817c6a90f7ce28cb732c2e1a5d637257d78d8e94f4221839a3fea193
 
IA-32:
vsftpd-2.2.2-13.el6_6.1.i686.rpm
    MD5: 3e9a104627e4d0d0ec04348c4e0312b9SHA-256: 9d393defe47ebbf92f9f4af41d0b7e09184644ba4c25317c3ed7e5c4fd59f7ab
vsftpd-debuginfo-2.2.2-13.el6_6.1.i686.rpm
    MD5: 606ce975833ebf7306780adea83a444dSHA-256: 5d7e12b525a25ea4cddabe6ee299cc2f1a73b9dbb2aa81c6e7e8b8cb67ecf12e
 
x86_64:
vsftpd-2.2.2-13.el6_6.1.x86_64.rpm
    MD5: bbd8a5fe17c9704446cbfc83bd7e54f4SHA-256: 3b86b9290722fe9e5d7fe415e6f25ea86ffc01e7c8f7ab6c1154d0e74a381602
vsftpd-debuginfo-2.2.2-13.el6_6.1.x86_64.rpm
    MD5: 4ec2bb51b96935b57fc4e49571ca6810SHA-256: da5d414a50a86c87c0427b2fea890b7c9331e1e81c226cdba29e495fbf9563c1
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply