Skip to navigation

Bug Fix Advisory curl bug fix update

Advisory: RHBA-2011:1188-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-08-19
Last updated on: 2011-08-19
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated curl package that fixes a bug is now available for Red Hat Enterprise
Linux 5.

The curl package provides the libcurl library and the cURL command line tool for
transferring data using various protocols, including FTP, HTTP, Gopher, Telnet,
and DICT. Both, libcurl and cURL, support many useful capabilities, such as user
authentication, proxy support, FTP uploading, HTTP POST and PUT methods, SSL
certificates, and file transfer resume.

This updated curl package fixes the following bug:

* As a solution to a security issue, GSSAPI credential delegation was disabled,
which broke the functionality of the applications that were relying on
delegation, which was incorrectly enabled by libcurl. To fix this issue, the
CURLOPT_GSSAPI_DELEGATION libcurl option has been introduced in order to enable
delegation explicitly when applications need it. All applications using GSSAPI
credential delegation can now use this new libcurl option to be able to run
properly. (BZ#727884)

All users of cURL and libcurl are advised to upgrade to this updated package,
which resolves this issue. All running applications using libcurl have to be
restarted for the update to take an effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
curl-7.15.5-9.el5_7.4.src.rpm
File outdated by:  RHSA-2013:0983
    MD5: 30843e36495e9eb7dc86c03f343dfa51
SHA-256: 0d4953be556b1ba1a2b09ac4f30fac86d5625794495e2f29135b2c73f81e1a64
 
IA-32:
curl-devel-7.15.5-9.el5_7.4.i386.rpm
File outdated by:  RHSA-2013:0983
    MD5: aa619f3313ddb0a05a90522158b13f48
SHA-256: 0769c798acce94c1608c81c9da0c729a967e373636a6c937223decb8114fb44b
 
x86_64:
curl-devel-7.15.5-9.el5_7.4.i386.rpm
File outdated by:  RHSA-2013:0983
    MD5: aa619f3313ddb0a05a90522158b13f48
SHA-256: 0769c798acce94c1608c81c9da0c729a967e373636a6c937223decb8114fb44b
curl-devel-7.15.5-9.el5_7.4.x86_64.rpm
File outdated by:  RHSA-2013:0983
    MD5: e3a346be4bad0216fae652da7f261ade
SHA-256: a475d9d713179db288cd22139d32ddc98cac3f05c0a76e45ea5107755e859ca8
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
curl-7.15.5-9.el5_7.4.src.rpm
File outdated by:  RHSA-2013:0983
    MD5: 30843e36495e9eb7dc86c03f343dfa51
SHA-256: 0d4953be556b1ba1a2b09ac4f30fac86d5625794495e2f29135b2c73f81e1a64
 
IA-32:
curl-7.15.5-9.el5_7.4.i386.rpm
File outdated by:  RHSA-2013:0983
    MD5: 1296b2aa482735c2874c58f4d674a8e0
SHA-256: e85ff2e44684f73416d2315eb414d5edc63e875a195fb5e7f9635e61e99d657f
curl-devel-7.15.5-9.el5_7.4.i386.rpm
File outdated by:  RHSA-2013:0983
    MD5: aa619f3313ddb0a05a90522158b13f48
SHA-256: 0769c798acce94c1608c81c9da0c729a967e373636a6c937223decb8114fb44b
 
IA-64:
curl-7.15.5-9.el5_7.4.ia64.rpm
File outdated by:  RHSA-2013:0983
    MD5: 7b1940d0471b8e7cdeb379905843db82
SHA-256: 5e91568906d9fe728482031be071600a3f2b17855827319269ed7d9425dac556
curl-devel-7.15.5-9.el5_7.4.ia64.rpm
File outdated by:  RHSA-2013:0983
    MD5: 6431268afef9571a4ecfb305a40ede34
SHA-256: 4649ce791ad04ac1bdef9db80948ba4a2bfd6512dc2fce17691d1bfe518336d1
 
PPC:
curl-7.15.5-9.el5_7.4.ppc.rpm
File outdated by:  RHSA-2013:0983
    MD5: 62b852749c7e0a040147bb4d867d4900
SHA-256: 412136ebc4f267ba93f22a3453bf9266594f20d48fec1d44f4f328a0d3cf7b5d
curl-7.15.5-9.el5_7.4.ppc64.rpm
File outdated by:  RHSA-2013:0983
    MD5: 82e1a63070ba3d8b560177c704ca894f
SHA-256: 7cab283f246641f84dd57fc606ac10a305fb2b261d3a62c6cdef652a903ffce4
curl-devel-7.15.5-9.el5_7.4.ppc.rpm
File outdated by:  RHSA-2013:0983
    MD5: 4bc87418aec659fba475aac3a379aae3
SHA-256: a315c17f72d44ce5960ed35b2a07bba38bdef42924c4ea534cbc0c3b423c0b52
curl-devel-7.15.5-9.el5_7.4.ppc64.rpm
File outdated by:  RHSA-2013:0983
    MD5: 7b57bd41445fa3c30d2d1c76933ee132
SHA-256: 80a7b1034f473285c418d5637c36d1121478609bf08c4ae9b0c0d060698a81e8
 
s390x:
curl-7.15.5-9.el5_7.4.s390.rpm
File outdated by:  RHSA-2013:0983
    MD5: 8dea024b395f7a83f34a00b5c8c80225
SHA-256: f1f5b8302561d5a25880c257c078a102d538233561b185ac69985de457ee4394
curl-7.15.5-9.el5_7.4.s390x.rpm
File outdated by:  RHSA-2013:0983
    MD5: 0453290f7ff706ee0e899afd043a4485
SHA-256: a00869bdca2a47f2c593a0b53313fdb63a4419f9717eb9f83643c82afb331c41
curl-devel-7.15.5-9.el5_7.4.s390.rpm
File outdated by:  RHSA-2013:0983
    MD5: 705cffb7d65b112bb48e7e029ee758fd
SHA-256: a32ca4cd63f9ef1d3a6288d8608b37155f7dcdda4d89643cc3e02dcba65bc3ff
curl-devel-7.15.5-9.el5_7.4.s390x.rpm
File outdated by:  RHSA-2013:0983
    MD5: 683873d9c7196da2019f1e86a255410b
SHA-256: ab9ddf60eb80616f20fad54225bd3346b5fe39ce042a941d53b3219550a7f10f
 
x86_64:
curl-7.15.5-9.el5_7.4.i386.rpm
File outdated by:  RHSA-2013:0983
    MD5: 1296b2aa482735c2874c58f4d674a8e0
SHA-256: e85ff2e44684f73416d2315eb414d5edc63e875a195fb5e7f9635e61e99d657f
curl-7.15.5-9.el5_7.4.x86_64.rpm
File outdated by:  RHSA-2013:0983
    MD5: f0c65007014dd1e6f63550ffc8872015
SHA-256: a22ba59d0561e713a5396ae8519ef5a33c2e0e4200fb7bfb2af5f6537a7f6fb0
curl-devel-7.15.5-9.el5_7.4.i386.rpm
File outdated by:  RHSA-2013:0983
    MD5: aa619f3313ddb0a05a90522158b13f48
SHA-256: 0769c798acce94c1608c81c9da0c729a967e373636a6c937223decb8114fb44b
curl-devel-7.15.5-9.el5_7.4.x86_64.rpm
File outdated by:  RHSA-2013:0983
    MD5: e3a346be4bad0216fae652da7f261ade
SHA-256: a475d9d713179db288cd22139d32ddc98cac3f05c0a76e45ea5107755e859ca8
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
curl-7.15.5-9.el5_7.4.src.rpm
File outdated by:  RHSA-2013:0983
    MD5: 30843e36495e9eb7dc86c03f343dfa51
SHA-256: 0d4953be556b1ba1a2b09ac4f30fac86d5625794495e2f29135b2c73f81e1a64
 
IA-32:
curl-7.15.5-9.el5_7.4.i386.rpm
File outdated by:  RHSA-2013:0983
    MD5: 1296b2aa482735c2874c58f4d674a8e0
SHA-256: e85ff2e44684f73416d2315eb414d5edc63e875a195fb5e7f9635e61e99d657f
 
x86_64:
curl-7.15.5-9.el5_7.4.i386.rpm
File outdated by:  RHSA-2013:0983
    MD5: 1296b2aa482735c2874c58f4d674a8e0
SHA-256: e85ff2e44684f73416d2315eb414d5edc63e875a195fb5e7f9635e61e99d657f
curl-7.15.5-9.el5_7.4.x86_64.rpm
File outdated by:  RHSA-2013:0983
    MD5: f0c65007014dd1e6f63550ffc8872015
SHA-256: a22ba59d0561e713a5396ae8519ef5a33c2e0e4200fb7bfb2af5f6537a7f6fb0
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

curl


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/