First published: Wed Feb 15 2017(Updated: )
curl, as shipped in Red Hat Enterprise Linux 6 before version 7.19.7-53, did not correctly backport the fix for CVE-2015-3148 because it did not reflect the fact that the HAVE_GSSAPI define was meanwhile substituted by USE_HTTP_NEGOTIATE. This issue was introduced in RHEL 6.7 and affects RHEL 6 curl only.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
curl | =7.19.7 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2628 has a medium severity rating due to its potential impact on the security of affected systems.
To fix CVE-2017-2628, upgrade curl to version 7.19.7-53 or later on Red Hat Enterprise Linux 6.
CVE-2017-2628 affects curl versions shipped in Red Hat Enterprise Linux 6 before 7.19.7-53.
The issue leading to CVE-2017-2628 was introduced in RHEL 6.7.
CVE-2017-2628 impacts Red Hat Enterprise Linux 6, including Desktop, Server, and Workstation variants.