Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:6157: Red Hat Security Advisory: curl security update

An update for curl is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-32206: curl: HTTP compression denial of service
  • CVE-2022-32207: curl: Unpreserved file permissions
  • CVE-2022-32208: curl: FTP-KRB bad message verification
Red Hat Security Data
#vulnerability#linux#red_hat#dos#ldap#ibm#sap

Synopsis

Moderate: curl security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for curl is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

  • curl: HTTP compression denial of service (CVE-2022-32206)
  • curl: Unpreserved file permissions (CVE-2022-32207)
  • curl: FTP-KRB bad message verification (CVE-2022-32208)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
  • Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
  • Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x

Fixes

  • BZ - 2099300 - CVE-2022-32206 curl: HTTP compression denial of service
  • BZ - 2099305 - CVE-2022-32207 curl: Unpreserved file permissions
  • BZ - 2099306 - CVE-2022-32208 curl: FTP-KRB bad message verification

Red Hat Enterprise Linux for x86_64 9

SRPM

curl-7.76.1-14.el9_0.5.src.rpm

SHA-256: ad80aa7832b430af1469a06422d521541481c23913417079c5238b7032a4a7e8

x86_64

curl-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: f250ab045d3648767f03e0a528611c140b818f9195efa9735b5ecaffb9e93083

curl-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: d640b99bfc6d98e67cbd2b981ceaf52f49a35e6c4b6446cd5c09c34cf5cf915d

curl-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: d640b99bfc6d98e67cbd2b981ceaf52f49a35e6c4b6446cd5c09c34cf5cf915d

curl-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 71283dc01669e2d205eca9b39471edef3641505dae1f713224c7bb0df397ee96

curl-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 71283dc01669e2d205eca9b39471edef3641505dae1f713224c7bb0df397ee96

curl-debugsource-7.76.1-14.el9_0.5.i686.rpm

SHA-256: c6fe7527cd240d5f887d04fbc08d939e2e016366f534f5dcb9666b0a4dce4fa7

curl-debugsource-7.76.1-14.el9_0.5.i686.rpm

SHA-256: c6fe7527cd240d5f887d04fbc08d939e2e016366f534f5dcb9666b0a4dce4fa7

curl-debugsource-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 0c95a0eb4002c1246bc8e691885879c03d9c50d174ad37334cfc8ceb515471eb

curl-debugsource-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 0c95a0eb4002c1246bc8e691885879c03d9c50d174ad37334cfc8ceb515471eb

curl-minimal-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 159735883fe81fd9676391ffbe3176f34fdd0f82ea1e63d18f27be62a3839da7

curl-minimal-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 9a267d6f07a093c2a32e8cacd657eeebbc9f1301aebd233b83f04d7aadcb438d

curl-minimal-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 9a267d6f07a093c2a32e8cacd657eeebbc9f1301aebd233b83f04d7aadcb438d

curl-minimal-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: ce186c6170a1c02f675146661747b053570ffb16650998a230e103471018b217

curl-minimal-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: ce186c6170a1c02f675146661747b053570ffb16650998a230e103471018b217

libcurl-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 988941c3e315d13a9357409e27dcb3c7bbdc4bb195cf82107aea05d31795d9da

libcurl-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: d546b40da684b04fa980ecf211197a5afeee44b129dc6d4dd9b7f88dc146016b

libcurl-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 26f47e660edf2b0da3461514d6f431446a430e77b6c9304a25dbd645020c9e73

libcurl-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 26f47e660edf2b0da3461514d6f431446a430e77b6c9304a25dbd645020c9e73

libcurl-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 667546a1647571c689bea1d82376e8c83a70fb7ce8238e7075e409451561d231

libcurl-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 667546a1647571c689bea1d82376e8c83a70fb7ce8238e7075e409451561d231

libcurl-devel-7.76.1-14.el9_0.5.i686.rpm

SHA-256: b699d4ba5a94011d2d90a7b91582288df2611984c2b9d092498273c1b3b54055

libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: a5fae111ecf6989ccd5c348a04a29c8600f2c5f64bea467dd709540fa341e9bb

libcurl-minimal-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 0de4d71b2e51012407a8ceba2c8b90659f8b543f7c7b88f2b7d4bef4f7ee88a8

libcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 328c6a40f61c48a9cdd0fcc91b1e91048d040ca9ff893e668e4902bc04759944

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 2df0537ff03bcdbe5c7de914ffcf87ccd4b93249846f4baccfa8284dab7cff57

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 2df0537ff03bcdbe5c7de914ffcf87ccd4b93249846f4baccfa8284dab7cff57

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: a9a61eeccb81538b4b83534ad65c6c7672490d1514058d8d09a22050b4b6e83f

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: a9a61eeccb81538b4b83534ad65c6c7672490d1514058d8d09a22050b4b6e83f

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0

SRPM

curl-7.76.1-14.el9_0.5.src.rpm

SHA-256: ad80aa7832b430af1469a06422d521541481c23913417079c5238b7032a4a7e8

x86_64

curl-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: f250ab045d3648767f03e0a528611c140b818f9195efa9735b5ecaffb9e93083

curl-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: d640b99bfc6d98e67cbd2b981ceaf52f49a35e6c4b6446cd5c09c34cf5cf915d

curl-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: d640b99bfc6d98e67cbd2b981ceaf52f49a35e6c4b6446cd5c09c34cf5cf915d

curl-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 71283dc01669e2d205eca9b39471edef3641505dae1f713224c7bb0df397ee96

curl-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 71283dc01669e2d205eca9b39471edef3641505dae1f713224c7bb0df397ee96

curl-debugsource-7.76.1-14.el9_0.5.i686.rpm

SHA-256: c6fe7527cd240d5f887d04fbc08d939e2e016366f534f5dcb9666b0a4dce4fa7

curl-debugsource-7.76.1-14.el9_0.5.i686.rpm

SHA-256: c6fe7527cd240d5f887d04fbc08d939e2e016366f534f5dcb9666b0a4dce4fa7

curl-debugsource-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 0c95a0eb4002c1246bc8e691885879c03d9c50d174ad37334cfc8ceb515471eb

curl-debugsource-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 0c95a0eb4002c1246bc8e691885879c03d9c50d174ad37334cfc8ceb515471eb

curl-minimal-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 159735883fe81fd9676391ffbe3176f34fdd0f82ea1e63d18f27be62a3839da7

curl-minimal-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 9a267d6f07a093c2a32e8cacd657eeebbc9f1301aebd233b83f04d7aadcb438d

curl-minimal-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 9a267d6f07a093c2a32e8cacd657eeebbc9f1301aebd233b83f04d7aadcb438d

curl-minimal-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: ce186c6170a1c02f675146661747b053570ffb16650998a230e103471018b217

curl-minimal-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: ce186c6170a1c02f675146661747b053570ffb16650998a230e103471018b217

libcurl-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 988941c3e315d13a9357409e27dcb3c7bbdc4bb195cf82107aea05d31795d9da

libcurl-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: d546b40da684b04fa980ecf211197a5afeee44b129dc6d4dd9b7f88dc146016b

libcurl-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 26f47e660edf2b0da3461514d6f431446a430e77b6c9304a25dbd645020c9e73

libcurl-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 26f47e660edf2b0da3461514d6f431446a430e77b6c9304a25dbd645020c9e73

libcurl-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 667546a1647571c689bea1d82376e8c83a70fb7ce8238e7075e409451561d231

libcurl-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 667546a1647571c689bea1d82376e8c83a70fb7ce8238e7075e409451561d231

libcurl-devel-7.76.1-14.el9_0.5.i686.rpm

SHA-256: b699d4ba5a94011d2d90a7b91582288df2611984c2b9d092498273c1b3b54055

libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: a5fae111ecf6989ccd5c348a04a29c8600f2c5f64bea467dd709540fa341e9bb

libcurl-minimal-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 0de4d71b2e51012407a8ceba2c8b90659f8b543f7c7b88f2b7d4bef4f7ee88a8

libcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 328c6a40f61c48a9cdd0fcc91b1e91048d040ca9ff893e668e4902bc04759944

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 2df0537ff03bcdbe5c7de914ffcf87ccd4b93249846f4baccfa8284dab7cff57

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 2df0537ff03bcdbe5c7de914ffcf87ccd4b93249846f4baccfa8284dab7cff57

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: a9a61eeccb81538b4b83534ad65c6c7672490d1514058d8d09a22050b4b6e83f

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: a9a61eeccb81538b4b83534ad65c6c7672490d1514058d8d09a22050b4b6e83f

Red Hat Enterprise Linux for IBM z Systems 9

SRPM

curl-7.76.1-14.el9_0.5.src.rpm

SHA-256: ad80aa7832b430af1469a06422d521541481c23913417079c5238b7032a4a7e8

s390x

curl-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 2ef3c5e521c57d84b8bbd3d3b5285f4d38c6aee5ab535627611ee83d947e225d

curl-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 7cbc56f1b10243efeffb1d9e003cded3defba089060a8892054ed0e1504c7f94

curl-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 7cbc56f1b10243efeffb1d9e003cded3defba089060a8892054ed0e1504c7f94

curl-debugsource-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: cc94659303f4a4a49c6798d0a23eed33d677e73e67a0f469839c182bf497af95

curl-debugsource-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: cc94659303f4a4a49c6798d0a23eed33d677e73e67a0f469839c182bf497af95

curl-minimal-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: e79f10e3fd3fb45e0253d94f6d8a525983af3a1bc27a0a6268f56f9633b048ef

curl-minimal-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 4052a20d97dca5f2cf2198b05afe7d3fd777dfc0b22138d4815892a85e38f435

curl-minimal-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 4052a20d97dca5f2cf2198b05afe7d3fd777dfc0b22138d4815892a85e38f435

libcurl-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 6f9ed33e801b203692242cc9e056a1c85de4e411155612d9e78345d13e289ce3

libcurl-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 857d4a18603a04bbb8783368e0329011a61d5208581cfed3b3e47eaae3e427dd

libcurl-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 857d4a18603a04bbb8783368e0329011a61d5208581cfed3b3e47eaae3e427dd

libcurl-devel-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 087667aea311aa33591a9b51ea54d48794f5bc5e961b1facf51c086c32d50abc

libcurl-minimal-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: c865a63e60bac8870a13045a73cd90dfc636657c047be500083ea78da8c91a22

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: bc49235d5719a1659f27fdadf3aff0685104a47571fb6da54ea260d6a423886c

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: bc49235d5719a1659f27fdadf3aff0685104a47571fb6da54ea260d6a423886c

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0

SRPM

curl-7.76.1-14.el9_0.5.src.rpm

SHA-256: ad80aa7832b430af1469a06422d521541481c23913417079c5238b7032a4a7e8

s390x

curl-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 2ef3c5e521c57d84b8bbd3d3b5285f4d38c6aee5ab535627611ee83d947e225d

curl-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 7cbc56f1b10243efeffb1d9e003cded3defba089060a8892054ed0e1504c7f94

curl-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 7cbc56f1b10243efeffb1d9e003cded3defba089060a8892054ed0e1504c7f94

curl-debugsource-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: cc94659303f4a4a49c6798d0a23eed33d677e73e67a0f469839c182bf497af95

curl-debugsource-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: cc94659303f4a4a49c6798d0a23eed33d677e73e67a0f469839c182bf497af95

curl-minimal-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: e79f10e3fd3fb45e0253d94f6d8a525983af3a1bc27a0a6268f56f9633b048ef

curl-minimal-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 4052a20d97dca5f2cf2198b05afe7d3fd777dfc0b22138d4815892a85e38f435

curl-minimal-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 4052a20d97dca5f2cf2198b05afe7d3fd777dfc0b22138d4815892a85e38f435

libcurl-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 6f9ed33e801b203692242cc9e056a1c85de4e411155612d9e78345d13e289ce3

libcurl-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 857d4a18603a04bbb8783368e0329011a61d5208581cfed3b3e47eaae3e427dd

libcurl-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 857d4a18603a04bbb8783368e0329011a61d5208581cfed3b3e47eaae3e427dd

libcurl-devel-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 087667aea311aa33591a9b51ea54d48794f5bc5e961b1facf51c086c32d50abc

libcurl-minimal-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: c865a63e60bac8870a13045a73cd90dfc636657c047be500083ea78da8c91a22

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: bc49235d5719a1659f27fdadf3aff0685104a47571fb6da54ea260d6a423886c

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: bc49235d5719a1659f27fdadf3aff0685104a47571fb6da54ea260d6a423886c

Red Hat Enterprise Linux for Power, little endian 9

SRPM

curl-7.76.1-14.el9_0.5.src.rpm

SHA-256: ad80aa7832b430af1469a06422d521541481c23913417079c5238b7032a4a7e8

ppc64le

curl-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: b11361f794aa72effbeddd47c9dbb259da3c655f126e90acdc5349470e9fff73

curl-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: fe492df1593237911cdd8683e6d603f6ef2024a3aac30855f22a2d6ee299d8d9

curl-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: fe492df1593237911cdd8683e6d603f6ef2024a3aac30855f22a2d6ee299d8d9

curl-debugsource-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 8aa68f68df48e730f014e140be3f10a9de4fa15656d327cf5ef849ea7a45751f

curl-debugsource-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 8aa68f68df48e730f014e140be3f10a9de4fa15656d327cf5ef849ea7a45751f

curl-minimal-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: ecbf284e7ce853eca7fe379b1ce728d555013819738ab0cda36535969209f337

curl-minimal-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 425619ef4b18983dcd7ca614aeddba1ea4a89e514b0b5f36fc21d61f02a14a71

curl-minimal-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 425619ef4b18983dcd7ca614aeddba1ea4a89e514b0b5f36fc21d61f02a14a71

libcurl-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 89a62bd0fea771611fc13de9b56cab2907b4552a0d15d0ff9692c18e3b26203c

libcurl-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 4d98ffc170f685fc19f42a3f489651877f195dde3f14c45bfd99e7c7911fe40e

libcurl-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 4d98ffc170f685fc19f42a3f489651877f195dde3f14c45bfd99e7c7911fe40e

libcurl-devel-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 6ab7b8c0d9421760d4a3bbb4a890c2f5c25227d41ac3df638e6a0195e524d5ae

libcurl-minimal-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 06469c05f5f198a531e33173e51fea33ae3a3a272108ac52cc2dad2a56aabe77

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 8e0fed3eecf7d40997e460b82566d649ae62a2c8493622c91471561331a85e45

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 8e0fed3eecf7d40997e460b82566d649ae62a2c8493622c91471561331a85e45

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0

SRPM

curl-7.76.1-14.el9_0.5.src.rpm

SHA-256: ad80aa7832b430af1469a06422d521541481c23913417079c5238b7032a4a7e8

ppc64le

curl-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: b11361f794aa72effbeddd47c9dbb259da3c655f126e90acdc5349470e9fff73

curl-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: fe492df1593237911cdd8683e6d603f6ef2024a3aac30855f22a2d6ee299d8d9

curl-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: fe492df1593237911cdd8683e6d603f6ef2024a3aac30855f22a2d6ee299d8d9

curl-debugsource-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 8aa68f68df48e730f014e140be3f10a9de4fa15656d327cf5ef849ea7a45751f

curl-debugsource-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 8aa68f68df48e730f014e140be3f10a9de4fa15656d327cf5ef849ea7a45751f

curl-minimal-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: ecbf284e7ce853eca7fe379b1ce728d555013819738ab0cda36535969209f337

curl-minimal-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 425619ef4b18983dcd7ca614aeddba1ea4a89e514b0b5f36fc21d61f02a14a71

curl-minimal-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 425619ef4b18983dcd7ca614aeddba1ea4a89e514b0b5f36fc21d61f02a14a71

libcurl-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 89a62bd0fea771611fc13de9b56cab2907b4552a0d15d0ff9692c18e3b26203c

libcurl-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 4d98ffc170f685fc19f42a3f489651877f195dde3f14c45bfd99e7c7911fe40e

libcurl-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 4d98ffc170f685fc19f42a3f489651877f195dde3f14c45bfd99e7c7911fe40e

libcurl-devel-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 6ab7b8c0d9421760d4a3bbb4a890c2f5c25227d41ac3df638e6a0195e524d5ae

libcurl-minimal-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 06469c05f5f198a531e33173e51fea33ae3a3a272108ac52cc2dad2a56aabe77

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 8e0fed3eecf7d40997e460b82566d649ae62a2c8493622c91471561331a85e45

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 8e0fed3eecf7d40997e460b82566d649ae62a2c8493622c91471561331a85e45

Red Hat Enterprise Linux for ARM 64 9

SRPM

curl-7.76.1-14.el9_0.5.src.rpm

SHA-256: ad80aa7832b430af1469a06422d521541481c23913417079c5238b7032a4a7e8

aarch64

curl-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: ab5cf3a4e0faadb44773f88c4127de10a0a8b8cd2ee35a0772c13dab51330405

curl-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 812963a733c3c60b1bd0def0b963605c1c3eb2d65d0ac78644a020e227f3a2c5

curl-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 812963a733c3c60b1bd0def0b963605c1c3eb2d65d0ac78644a020e227f3a2c5

curl-debugsource-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 3763001eaa076a8c63a45ff06ad5f0749c319070848b94b3a55b602902f91ada

curl-debugsource-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 3763001eaa076a8c63a45ff06ad5f0749c319070848b94b3a55b602902f91ada

curl-minimal-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 58be42854c668b0264c2501faa5d5805a1c0dfaff9f418a9f68dbceb5fcb5a25

curl-minimal-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 95342409a84f8e0b5301b25c98b2b2439baa450a889bab64208dbf5b60248c12

curl-minimal-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 95342409a84f8e0b5301b25c98b2b2439baa450a889bab64208dbf5b60248c12

libcurl-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: c87026639e5576bab35218b91baccb212236586b28a5c515af5dbaa72a5b4d59

libcurl-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 6c4ac3dfd2ffaf8c6d8a75c2df32354ef7389628197b3639ba04dda1b9f2de71

libcurl-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 6c4ac3dfd2ffaf8c6d8a75c2df32354ef7389628197b3639ba04dda1b9f2de71

libcurl-devel-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 210f43bd8e9e7646c3a8ba19a7a0bebbcf171c424f35336eeb175d5b29c09bd7

libcurl-minimal-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: c105ff19dafd391b278065bed726156a0c4f776449b30c5804ce7353f98a469d

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: c0db019c6f3177baf74fc4ccc4c14b8288b16812f43000cf58ad0b886f6c565e

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: c0db019c6f3177baf74fc4ccc4c14b8288b16812f43000cf58ad0b886f6c565e

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0

SRPM

curl-7.76.1-14.el9_0.5.src.rpm

SHA-256: ad80aa7832b430af1469a06422d521541481c23913417079c5238b7032a4a7e8

aarch64

curl-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: ab5cf3a4e0faadb44773f88c4127de10a0a8b8cd2ee35a0772c13dab51330405

curl-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 812963a733c3c60b1bd0def0b963605c1c3eb2d65d0ac78644a020e227f3a2c5

curl-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 812963a733c3c60b1bd0def0b963605c1c3eb2d65d0ac78644a020e227f3a2c5

curl-debugsource-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 3763001eaa076a8c63a45ff06ad5f0749c319070848b94b3a55b602902f91ada

curl-debugsource-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 3763001eaa076a8c63a45ff06ad5f0749c319070848b94b3a55b602902f91ada

curl-minimal-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 58be42854c668b0264c2501faa5d5805a1c0dfaff9f418a9f68dbceb5fcb5a25

curl-minimal-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 95342409a84f8e0b5301b25c98b2b2439baa450a889bab64208dbf5b60248c12

curl-minimal-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 95342409a84f8e0b5301b25c98b2b2439baa450a889bab64208dbf5b60248c12

libcurl-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: c87026639e5576bab35218b91baccb212236586b28a5c515af5dbaa72a5b4d59

libcurl-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 6c4ac3dfd2ffaf8c6d8a75c2df32354ef7389628197b3639ba04dda1b9f2de71

libcurl-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 6c4ac3dfd2ffaf8c6d8a75c2df32354ef7389628197b3639ba04dda1b9f2de71

libcurl-devel-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 210f43bd8e9e7646c3a8ba19a7a0bebbcf171c424f35336eeb175d5b29c09bd7

libcurl-minimal-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: c105ff19dafd391b278065bed726156a0c4f776449b30c5804ce7353f98a469d

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: c0db019c6f3177baf74fc4ccc4c14b8288b16812f43000cf58ad0b886f6c565e

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: c0db019c6f3177baf74fc4ccc4c14b8288b16812f43000cf58ad0b886f6c565e

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0

SRPM

curl-7.76.1-14.el9_0.5.src.rpm

SHA-256: ad80aa7832b430af1469a06422d521541481c23913417079c5238b7032a4a7e8

ppc64le

curl-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: b11361f794aa72effbeddd47c9dbb259da3c655f126e90acdc5349470e9fff73

curl-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: fe492df1593237911cdd8683e6d603f6ef2024a3aac30855f22a2d6ee299d8d9

curl-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: fe492df1593237911cdd8683e6d603f6ef2024a3aac30855f22a2d6ee299d8d9

curl-debugsource-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 8aa68f68df48e730f014e140be3f10a9de4fa15656d327cf5ef849ea7a45751f

curl-debugsource-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 8aa68f68df48e730f014e140be3f10a9de4fa15656d327cf5ef849ea7a45751f

curl-minimal-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: ecbf284e7ce853eca7fe379b1ce728d555013819738ab0cda36535969209f337

curl-minimal-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 425619ef4b18983dcd7ca614aeddba1ea4a89e514b0b5f36fc21d61f02a14a71

curl-minimal-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 425619ef4b18983dcd7ca614aeddba1ea4a89e514b0b5f36fc21d61f02a14a71

libcurl-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 89a62bd0fea771611fc13de9b56cab2907b4552a0d15d0ff9692c18e3b26203c

libcurl-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 4d98ffc170f685fc19f42a3f489651877f195dde3f14c45bfd99e7c7911fe40e

libcurl-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 4d98ffc170f685fc19f42a3f489651877f195dde3f14c45bfd99e7c7911fe40e

libcurl-devel-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 6ab7b8c0d9421760d4a3bbb4a890c2f5c25227d41ac3df638e6a0195e524d5ae

libcurl-minimal-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 06469c05f5f198a531e33173e51fea33ae3a3a272108ac52cc2dad2a56aabe77

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 8e0fed3eecf7d40997e460b82566d649ae62a2c8493622c91471561331a85e45

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.ppc64le.rpm

SHA-256: 8e0fed3eecf7d40997e460b82566d649ae62a2c8493622c91471561331a85e45

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0

SRPM

curl-7.76.1-14.el9_0.5.src.rpm

SHA-256: ad80aa7832b430af1469a06422d521541481c23913417079c5238b7032a4a7e8

x86_64

curl-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: f250ab045d3648767f03e0a528611c140b818f9195efa9735b5ecaffb9e93083

curl-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: d640b99bfc6d98e67cbd2b981ceaf52f49a35e6c4b6446cd5c09c34cf5cf915d

curl-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: d640b99bfc6d98e67cbd2b981ceaf52f49a35e6c4b6446cd5c09c34cf5cf915d

curl-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 71283dc01669e2d205eca9b39471edef3641505dae1f713224c7bb0df397ee96

curl-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 71283dc01669e2d205eca9b39471edef3641505dae1f713224c7bb0df397ee96

curl-debugsource-7.76.1-14.el9_0.5.i686.rpm

SHA-256: c6fe7527cd240d5f887d04fbc08d939e2e016366f534f5dcb9666b0a4dce4fa7

curl-debugsource-7.76.1-14.el9_0.5.i686.rpm

SHA-256: c6fe7527cd240d5f887d04fbc08d939e2e016366f534f5dcb9666b0a4dce4fa7

curl-debugsource-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 0c95a0eb4002c1246bc8e691885879c03d9c50d174ad37334cfc8ceb515471eb

curl-debugsource-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 0c95a0eb4002c1246bc8e691885879c03d9c50d174ad37334cfc8ceb515471eb

curl-minimal-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 159735883fe81fd9676391ffbe3176f34fdd0f82ea1e63d18f27be62a3839da7

curl-minimal-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 9a267d6f07a093c2a32e8cacd657eeebbc9f1301aebd233b83f04d7aadcb438d

curl-minimal-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 9a267d6f07a093c2a32e8cacd657eeebbc9f1301aebd233b83f04d7aadcb438d

curl-minimal-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: ce186c6170a1c02f675146661747b053570ffb16650998a230e103471018b217

curl-minimal-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: ce186c6170a1c02f675146661747b053570ffb16650998a230e103471018b217

libcurl-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 988941c3e315d13a9357409e27dcb3c7bbdc4bb195cf82107aea05d31795d9da

libcurl-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: d546b40da684b04fa980ecf211197a5afeee44b129dc6d4dd9b7f88dc146016b

libcurl-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 26f47e660edf2b0da3461514d6f431446a430e77b6c9304a25dbd645020c9e73

libcurl-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 26f47e660edf2b0da3461514d6f431446a430e77b6c9304a25dbd645020c9e73

libcurl-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 667546a1647571c689bea1d82376e8c83a70fb7ce8238e7075e409451561d231

libcurl-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 667546a1647571c689bea1d82376e8c83a70fb7ce8238e7075e409451561d231

libcurl-devel-7.76.1-14.el9_0.5.i686.rpm

SHA-256: b699d4ba5a94011d2d90a7b91582288df2611984c2b9d092498273c1b3b54055

libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: a5fae111ecf6989ccd5c348a04a29c8600f2c5f64bea467dd709540fa341e9bb

libcurl-minimal-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 0de4d71b2e51012407a8ceba2c8b90659f8b543f7c7b88f2b7d4bef4f7ee88a8

libcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: 328c6a40f61c48a9cdd0fcc91b1e91048d040ca9ff893e668e4902bc04759944

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 2df0537ff03bcdbe5c7de914ffcf87ccd4b93249846f4baccfa8284dab7cff57

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.i686.rpm

SHA-256: 2df0537ff03bcdbe5c7de914ffcf87ccd4b93249846f4baccfa8284dab7cff57

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: a9a61eeccb81538b4b83534ad65c6c7672490d1514058d8d09a22050b4b6e83f

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.x86_64.rpm

SHA-256: a9a61eeccb81538b4b83534ad65c6c7672490d1514058d8d09a22050b4b6e83f

Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0

SRPM

curl-7.76.1-14.el9_0.5.src.rpm

SHA-256: ad80aa7832b430af1469a06422d521541481c23913417079c5238b7032a4a7e8

aarch64

curl-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: ab5cf3a4e0faadb44773f88c4127de10a0a8b8cd2ee35a0772c13dab51330405

curl-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 812963a733c3c60b1bd0def0b963605c1c3eb2d65d0ac78644a020e227f3a2c5

curl-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 812963a733c3c60b1bd0def0b963605c1c3eb2d65d0ac78644a020e227f3a2c5

curl-debugsource-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 3763001eaa076a8c63a45ff06ad5f0749c319070848b94b3a55b602902f91ada

curl-debugsource-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 3763001eaa076a8c63a45ff06ad5f0749c319070848b94b3a55b602902f91ada

curl-minimal-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 58be42854c668b0264c2501faa5d5805a1c0dfaff9f418a9f68dbceb5fcb5a25

curl-minimal-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 95342409a84f8e0b5301b25c98b2b2439baa450a889bab64208dbf5b60248c12

curl-minimal-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 95342409a84f8e0b5301b25c98b2b2439baa450a889bab64208dbf5b60248c12

libcurl-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: c87026639e5576bab35218b91baccb212236586b28a5c515af5dbaa72a5b4d59

libcurl-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 6c4ac3dfd2ffaf8c6d8a75c2df32354ef7389628197b3639ba04dda1b9f2de71

libcurl-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 6c4ac3dfd2ffaf8c6d8a75c2df32354ef7389628197b3639ba04dda1b9f2de71

libcurl-devel-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: 210f43bd8e9e7646c3a8ba19a7a0bebbcf171c424f35336eeb175d5b29c09bd7

libcurl-minimal-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: c105ff19dafd391b278065bed726156a0c4f776449b30c5804ce7353f98a469d

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: c0db019c6f3177baf74fc4ccc4c14b8288b16812f43000cf58ad0b886f6c565e

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.aarch64.rpm

SHA-256: c0db019c6f3177baf74fc4ccc4c14b8288b16812f43000cf58ad0b886f6c565e

Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0

SRPM

curl-7.76.1-14.el9_0.5.src.rpm

SHA-256: ad80aa7832b430af1469a06422d521541481c23913417079c5238b7032a4a7e8

s390x

curl-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 2ef3c5e521c57d84b8bbd3d3b5285f4d38c6aee5ab535627611ee83d947e225d

curl-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 7cbc56f1b10243efeffb1d9e003cded3defba089060a8892054ed0e1504c7f94

curl-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 7cbc56f1b10243efeffb1d9e003cded3defba089060a8892054ed0e1504c7f94

curl-debugsource-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: cc94659303f4a4a49c6798d0a23eed33d677e73e67a0f469839c182bf497af95

curl-debugsource-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: cc94659303f4a4a49c6798d0a23eed33d677e73e67a0f469839c182bf497af95

curl-minimal-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: e79f10e3fd3fb45e0253d94f6d8a525983af3a1bc27a0a6268f56f9633b048ef

curl-minimal-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 4052a20d97dca5f2cf2198b05afe7d3fd777dfc0b22138d4815892a85e38f435

curl-minimal-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 4052a20d97dca5f2cf2198b05afe7d3fd777dfc0b22138d4815892a85e38f435

libcurl-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 6f9ed33e801b203692242cc9e056a1c85de4e411155612d9e78345d13e289ce3

libcurl-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 857d4a18603a04bbb8783368e0329011a61d5208581cfed3b3e47eaae3e427dd

libcurl-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 857d4a18603a04bbb8783368e0329011a61d5208581cfed3b3e47eaae3e427dd

libcurl-devel-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: 087667aea311aa33591a9b51ea54d48794f5bc5e961b1facf51c086c32d50abc

libcurl-minimal-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: c865a63e60bac8870a13045a73cd90dfc636657c047be500083ea78da8c91a22

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: bc49235d5719a1659f27fdadf3aff0685104a47571fb6da54ea260d6a423886c

libcurl-minimal-debuginfo-7.76.1-14.el9_0.5.s390x.rpm

SHA-256: bc49235d5719a1659f27fdadf3aff0685104a47571fb6da54ea260d6a423886c

Related news

RHSA-2023:3460: Red Hat Security Advisory: curl security update

An update for curl is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32206: A vulnerability was found in curl. This issue occurs because the number of acceptable "links" in the "decompression chain" was unbounded, allowing a malicious server to insert ...

CVE-2022-46679: DSA-2022-323: Dell PowerScale OneFS Security Updates for Multiple Security Vulnerabilities

Dell PowerScale OneFS 8.2.x, 9.0.0.x - 9.4.0.x, contain an insufficient resource pool vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to denial of service.

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

Red Hat Security Advisory 2023-0408-01

Red Hat Security Advisory 2023-0408-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. Issues addressed include denial of service and out of bounds read vulnerabilities.

Gentoo Linux Security Advisory 202212-01

Gentoo Linux Security Advisory 202212-1 - Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. Versions less than 7.86.0 are affected.

CVE-2022-29838: WDC-22019 My Cloud Firmware Version 5.25.124 | Western Digital

Improper Authentication vulnerability in the encrypted volumes and auto mount features of Western Digital My Cloud devices allows insecure direct access to the drive information in the case of a device reset. This issue affects: Western Digital My Cloud My Cloud versions prior to 5.25.124 on Linux.

Red Hat Security Advisory 2022-8840-01

Red Hat Security Advisory 2022-8840-01 - Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.51, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include buffer overflow, bypass, code execution, denial of service, double free, and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-8841-01

Red Hat Security Advisory 2022-8841-01 - Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.51, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include buffer over-read, buffer overflow, bypass, code execution, denial of service, double free, integer overflow, out of bounds read, and use-after-free vulnerabilities.

RHSA-2022:8841: Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 SP1 security update

An update is now available for Red Hat JBoss Core Services. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1292: openssl: c_rehash script allows command injection * CVE-2022-2068: openssl: the c_rehash script allows command injection * CVE-2022-22721: httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody * CVE-2022-23943: httpd: mod_sed: Read/write beyond bounds * CVE-2022-26377: httpd: mod_proxy_ajp: Possible request smuggling * CVE-2...

RHSA-2022:8840: Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 SP1 security update

An update is now available for Red Hat JBoss Core Services. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1292: openssl: c_rehash script allows command injection * CVE-2022-2068: openssl: the c_rehash script allows command injection * CVE-2022-22721: httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody * CVE-2022-23943: httpd: mod_sed: Read/write beyond bounds * CVE-2022-26377: httpd: mod_proxy_ajp: Possible request smuggling * CVE-20...

CVE-2022-29837: WDC-22018 Western Digital My Cloud Home, My Cloud Home Duo and SanDisk ibi Firmware Version 8.12.0-178 | Western Digital

A path traversal vulnerability was addressed in Western Digital My Cloud Home, My Cloud Home Duo and SanDisk ibi which could allow an attacker to initiate installation of custom ZIP packages and overwrite system files. This could potentially lead to a code execution.

CVE-2022-26730: About the security content of macOS Ventura 13

A memory corruption issue existed in the processing of ICC profiles. This issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13. Processing a maliciously crafted image may lead to arbitrary code execution.

Red Hat Security Advisory 2022-7058-01

Red Hat Security Advisory 2022-7058-01 - OpenShift sandboxed containers support for OpenShift Container Platform provides users with built-in support for running Kata containers as an additional, optional runtime. This advisory contains an update for OpenShift sandboxed containers with security fixes and a bug fix. Space precludes documenting all of the updates to OpenShift sandboxed containers in this advisory. Issues addressed include a null pointer vulnerability.

CVE-2022-21587: Oracle Critical Patch Update Advisory - October 2022

Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Red Hat Security Advisory 2022-6696-01

Red Hat Security Advisory 2022-6696-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. Issues addressed include crlf injection and denial of service vulnerabilities.

Red Hat Security Advisory 2022-6560-01

Red Hat Security Advisory 2022-6560-01 - An update is now available for OpenShift Logging 5.3.12 Red Hat Product Security has rated this update as having a security impact of Moderate.

RHSA-2022:6714: Red Hat Security Advisory: RHACS 3.72 enhancement and security update

Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). The updated image includes new features and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921: golang: regexp: stack exhaustion via a deeply nested expression * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar * CVE-2022-29526: golang: syscall: faccessat checks wrong gr...

RHSA-2022:6696: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.6 security update and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-31150: nodejs16: CRLF injection in node-undici * CVE-2022-31151: nodejs/undici: Cookie headers uncleared on cross-origin redirect * CV...

Red Hat Security Advisory 2022-6507-01

Red Hat Security Advisory 2022-6507-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

RHSA-2022:6507: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.2 security fixes and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.5.2 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-36067: vm2: Sandbox Escape in vm2

Red Hat Security Advisory 2022-6429-01

Red Hat Security Advisory 2022-6429-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include bypass, code execution, and denial of service vulnerabilities.

Red Hat Security Advisory 2022-6430-01

Red Hat Security Advisory 2022-6430-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

RHSA-2022:6430: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.4 security and bug fix update

OpenShift API for Data Protection (OADP) 1.0.4 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-30629: golang: crypto/tls: session ti...

RHSA-2022:6422: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.0.2 security and bug fixes

Multicluster Engine for Kubernetes 2.0.2 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-36067: vm2: Sandbox Escape in vm2

CVE-2022-38701: en/security-disclosure/2022/2022-09.md · OpenHarmony/security - Gitee.com

OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.

Red Hat Security Advisory 2022-6287-01

Red Hat Security Advisory 2022-6287-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.3. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

RHSA-2022:6287: Red Hat Security Advisory: OpenShift Container Platform 4.11.3 packages and security update

Red Hat OpenShift Container Platform release 4.11.3 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS

Red Hat Security Advisory 2022-6182-01

Red Hat Security Advisory 2022-6182-01 - Openshift Logging Bug Fix Release. Issue addressed include a stack exhaustion vulnerability.

Red Hat Security Advisory 2022-6370-01

Red Hat Security Advisory 2022-6370-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix security issues and several bugs. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6183-01

Red Hat Security Advisory 2022-6183-01 - Logging Subsystem 5.4.5 for Red Hat OpenShift has been released. Issue addressed include a stack exhaustion vulnerability.

Red Hat Security Advisory 2022-6345-01

Red Hat Security Advisory 2022-6345-01 - Multicluster engine for Kubernetes 2.1 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6348-01

Red Hat Security Advisory 2022-6348-01 - Gatekeeper is an open source project that applies the OPA Constraint Framework to enforce policies on your Kubernetes clusters. This advisory contains the container images for Gatekeeper that include bug fixes and container upgrades.

Red Hat Security Advisory 2022-6344-01

Red Hat Security Advisory 2022-6344-01 - Logging Subsystem 5.5.1 for Red Hat OpenShift has been released. Issue addressed include a stack exhaustion vulnerability.

RHSA-2022:6345: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1 security updates and bug fixes

Multicluster Engine v2.1 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: golang: compress/gzi...

RHSA-2022:6183: Red Hat Security Advisory: Logging Subsystem 5.4.5 Security and Bug Fix Update

Logging Subsystem 5.4.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read * CVE-2022-32148: golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working

Red Hat Security Advisory 2022-6290-01

Red Hat Security Advisory 2022-6290-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6271-01

Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

RHSA-2022:6290: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.0 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.0 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaus...

Red Hat Security Advisory 2022-6157-01

Red Hat Security Advisory 2022-6157-01 - The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Issues addressed include a denial of service vulnerability.

RHSA-2022:6159: Red Hat Security Advisory: curl security update

An update for curl is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32206: curl: HTTP compression denial of service * CVE-2022-32208: curl: FTP-KRB bad message verification

RHSA-2022:6159: Red Hat Security Advisory: curl security update

An update for curl is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32206: curl: HTTP compression denial of service * CVE-2022-32208: curl: FTP-KRB bad message verification

CVE-2022-32208

When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.

CVE-2022-32207

When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.

CVE-2022-32206

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.

Ubuntu Security Notice USN-5499-1

Ubuntu Security Notice 5499-1 - Florian Kohnhuser discovered that curl incorrectly handled returning a TLS server’s certificate chain details. A remote attacker could possibly use this issue to cause curl to stop responding, resulting in a denial of service. Harry Sintonen discovered that curl incorrectly handled certain FTP-KRB messages. An attacker could possibly use this to perform a machine-in-the-middle attack.

Ubuntu Security Notice USN-5495-1

Ubuntu Security Notice 5495-1 - Harry Sintonen discovered that curl incorrectly handled certain cookies. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 21.10, and Ubuntu 22.04 LTS. Harry Sintonen discovered that curl incorrectly handled certain HTTP compressions. An attacker could possibly use this issue to cause a denial of service. Harry Sintonen incorrectly handled certain file permissions. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 21.10, and Ubuntu 22.04 LTS.

Ubuntu Security Notice USN-5495-1

Ubuntu Security Notice 5495-1 - Harry Sintonen discovered that curl incorrectly handled certain cookies. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 21.10, and Ubuntu 22.04 LTS. Harry Sintonen discovered that curl incorrectly handled certain HTTP compressions. An attacker could possibly use this issue to cause a denial of service. Harry Sintonen incorrectly handled certain file permissions. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 21.10, and Ubuntu 22.04 LTS.

Ubuntu Security Notice USN-5495-1

Ubuntu Security Notice 5495-1 - Harry Sintonen discovered that curl incorrectly handled certain cookies. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 21.10, and Ubuntu 22.04 LTS. Harry Sintonen discovered that curl incorrectly handled certain HTTP compressions. An attacker could possibly use this issue to cause a denial of service. Harry Sintonen incorrectly handled certain file permissions. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 21.10, and Ubuntu 22.04 LTS.