Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5245: Red Hat Security Advisory: curl security update

An update for curl is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-22576: curl: OAUTH2 bearer bypass in connection re-use
  • CVE-2022-27774: curl: credential leak on redirect
  • CVE-2022-27776: curl: auth/cookie leak on redirect
  • CVE-2022-27782: curl: TLS and SSH connection too eager reuse
Red Hat Security Data
#vulnerability#linux#red_hat#ldap#oauth#auth#ssh#ibm#sap#ssl

Synopsis

Moderate: curl security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for curl is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

  • curl: OAUTH2 bearer bypass in connection re-use (CVE-2022-22576)
  • curl: credential leak on redirect (CVE-2022-27774)
  • curl: auth/cookie leak on redirect (CVE-2022-27776)
  • curl: TLS and SSH connection too eager reuse (CVE-2022-27782)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
  • Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
  • Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x

Fixes

  • BZ - 2077541 - CVE-2022-22576 curl: OAUTH2 bearer bypass in connection re-use
  • BZ - 2077547 - CVE-2022-27774 curl: credential leak on redirect
  • BZ - 2078408 - CVE-2022-27776 curl: auth/cookie leak on redirect
  • BZ - 2082215 - CVE-2022-27782 curl: TLS and SSH connection too eager reuse

CVEs

  • CVE-2022-22576
  • CVE-2022-27774
  • CVE-2022-27776
  • CVE-2022-27782

Red Hat Enterprise Linux for x86_64 9

SRPM

curl-7.76.1-14.el9_0.4.src.rpm

SHA-256: cde82084e238a8435c51bf62f14ebb69426d95b4329116956c8ff69515026383

x86_64

curl-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 3b384f4a6e65d32eb002aa79e9266c8e056d42401af6e2a9b04a3b75e47adc81

curl-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 9718aad155263f758c0c6833f406a6d82e6fbddff8bccda2c988a78b96bb9109

curl-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 9718aad155263f758c0c6833f406a6d82e6fbddff8bccda2c988a78b96bb9109

curl-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: d5e6e66cdc113dd589457e35f43fb85193b10666b2d11b2884d5abf3b05631db

curl-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: d5e6e66cdc113dd589457e35f43fb85193b10666b2d11b2884d5abf3b05631db

curl-debugsource-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 3c5b22f90a6632fbafb2a0bc2b1816bb68d8755121f168dfab33bcfddcd4076b

curl-debugsource-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 3c5b22f90a6632fbafb2a0bc2b1816bb68d8755121f168dfab33bcfddcd4076b

curl-debugsource-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 8f029f88dc8e0152d0273386a294973c30f68ef2bec023afd87628284e79211b

curl-debugsource-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 8f029f88dc8e0152d0273386a294973c30f68ef2bec023afd87628284e79211b

curl-minimal-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: b6c7743db71496e4e444217aec717e4dbf3c0b3324d02fcd84c4a0cc257b5936

curl-minimal-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: a1131696e862ff1162aba57c58ccbd6f665ce48bcea6dcfc7c06206cf92dc162

curl-minimal-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: a1131696e862ff1162aba57c58ccbd6f665ce48bcea6dcfc7c06206cf92dc162

curl-minimal-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 255e1b3d70510b878dc683a5a8917a93dd94e79461a47d154b46f818ec691fbe

curl-minimal-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 255e1b3d70510b878dc683a5a8917a93dd94e79461a47d154b46f818ec691fbe

libcurl-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 0429303992dbc2d60c306a66cbd338965d6c1f53210be43d54587a27caedf85e

libcurl-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 88411d33e0306612ae7ec760965853082941c6fdeb59427182c82e01b33e4305

libcurl-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: c20d7d9f98115dbd3a99394e5a5aea1b29d7d59e14fd98c36b6c19fab8694db6

libcurl-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: c20d7d9f98115dbd3a99394e5a5aea1b29d7d59e14fd98c36b6c19fab8694db6

libcurl-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: ae0930cf5fabc814315ccc747f7f1ec66567ac449adf6272e73e99e980067056

libcurl-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: ae0930cf5fabc814315ccc747f7f1ec66567ac449adf6272e73e99e980067056

libcurl-devel-7.76.1-14.el9_0.4.i686.rpm

SHA-256: c5c15e89818b8b3bc8cbf35ca6dc1867df17ad44a694640bfef5c1bc291f0267

libcurl-devel-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 3a605a88225d726db82d69600f4d9db1265aa80354ffdeb429ad67faa9fdefd0

libcurl-minimal-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 98587a9030be6f4c96b90c0dbed9b2232412e401eabfc640ef7c70b9042fabc5

libcurl-minimal-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: d7de67ad8ea7a28f6f53764173cbfdbe3701d547d3ab9037b9e5da2bd50ca7a4

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 91da2f30a34de15b254a23c5adf86fe5fc904f730045e1ab822f92fc5f97b00c

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 91da2f30a34de15b254a23c5adf86fe5fc904f730045e1ab822f92fc5f97b00c

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 8ab08cbac2913e6b5d19fb2dd964f84118dc2a0c34e5010bfda706f3a11e2bc2

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 8ab08cbac2913e6b5d19fb2dd964f84118dc2a0c34e5010bfda706f3a11e2bc2

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0

SRPM

curl-7.76.1-14.el9_0.4.src.rpm

SHA-256: cde82084e238a8435c51bf62f14ebb69426d95b4329116956c8ff69515026383

x86_64

curl-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 3b384f4a6e65d32eb002aa79e9266c8e056d42401af6e2a9b04a3b75e47adc81

curl-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 9718aad155263f758c0c6833f406a6d82e6fbddff8bccda2c988a78b96bb9109

curl-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 9718aad155263f758c0c6833f406a6d82e6fbddff8bccda2c988a78b96bb9109

curl-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: d5e6e66cdc113dd589457e35f43fb85193b10666b2d11b2884d5abf3b05631db

curl-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: d5e6e66cdc113dd589457e35f43fb85193b10666b2d11b2884d5abf3b05631db

curl-debugsource-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 3c5b22f90a6632fbafb2a0bc2b1816bb68d8755121f168dfab33bcfddcd4076b

curl-debugsource-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 3c5b22f90a6632fbafb2a0bc2b1816bb68d8755121f168dfab33bcfddcd4076b

curl-debugsource-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 8f029f88dc8e0152d0273386a294973c30f68ef2bec023afd87628284e79211b

curl-debugsource-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 8f029f88dc8e0152d0273386a294973c30f68ef2bec023afd87628284e79211b

curl-minimal-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: b6c7743db71496e4e444217aec717e4dbf3c0b3324d02fcd84c4a0cc257b5936

curl-minimal-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: a1131696e862ff1162aba57c58ccbd6f665ce48bcea6dcfc7c06206cf92dc162

curl-minimal-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: a1131696e862ff1162aba57c58ccbd6f665ce48bcea6dcfc7c06206cf92dc162

curl-minimal-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 255e1b3d70510b878dc683a5a8917a93dd94e79461a47d154b46f818ec691fbe

curl-minimal-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 255e1b3d70510b878dc683a5a8917a93dd94e79461a47d154b46f818ec691fbe

libcurl-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 0429303992dbc2d60c306a66cbd338965d6c1f53210be43d54587a27caedf85e

libcurl-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 88411d33e0306612ae7ec760965853082941c6fdeb59427182c82e01b33e4305

libcurl-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: c20d7d9f98115dbd3a99394e5a5aea1b29d7d59e14fd98c36b6c19fab8694db6

libcurl-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: c20d7d9f98115dbd3a99394e5a5aea1b29d7d59e14fd98c36b6c19fab8694db6

libcurl-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: ae0930cf5fabc814315ccc747f7f1ec66567ac449adf6272e73e99e980067056

libcurl-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: ae0930cf5fabc814315ccc747f7f1ec66567ac449adf6272e73e99e980067056

libcurl-devel-7.76.1-14.el9_0.4.i686.rpm

SHA-256: c5c15e89818b8b3bc8cbf35ca6dc1867df17ad44a694640bfef5c1bc291f0267

libcurl-devel-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 3a605a88225d726db82d69600f4d9db1265aa80354ffdeb429ad67faa9fdefd0

libcurl-minimal-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 98587a9030be6f4c96b90c0dbed9b2232412e401eabfc640ef7c70b9042fabc5

libcurl-minimal-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: d7de67ad8ea7a28f6f53764173cbfdbe3701d547d3ab9037b9e5da2bd50ca7a4

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 91da2f30a34de15b254a23c5adf86fe5fc904f730045e1ab822f92fc5f97b00c

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 91da2f30a34de15b254a23c5adf86fe5fc904f730045e1ab822f92fc5f97b00c

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 8ab08cbac2913e6b5d19fb2dd964f84118dc2a0c34e5010bfda706f3a11e2bc2

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 8ab08cbac2913e6b5d19fb2dd964f84118dc2a0c34e5010bfda706f3a11e2bc2

Red Hat Enterprise Linux for IBM z Systems 9

SRPM

curl-7.76.1-14.el9_0.4.src.rpm

SHA-256: cde82084e238a8435c51bf62f14ebb69426d95b4329116956c8ff69515026383

s390x

curl-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 609afb9745565d2645205ddf0d507e7298ebbeeab4f861b00f944d4f556a56ae

curl-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 3894ca90cea4d19ea37d8824b986c8881e250b41f4621ba107668ec40e83f4bb

curl-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 3894ca90cea4d19ea37d8824b986c8881e250b41f4621ba107668ec40e83f4bb

curl-debugsource-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: c527060be9b7ef798451855dadfa08178f9c6b74ebca3795ed5c94198d4c7c3e

curl-debugsource-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: c527060be9b7ef798451855dadfa08178f9c6b74ebca3795ed5c94198d4c7c3e

curl-minimal-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 71fee1eab0feee84268a2baf068fc0835d295eb7c3b31936ceaac9b52850d462

curl-minimal-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: e5b033573611e7de65065f59a3098d6ea149466abbbb06ffd28d79cef7c131ad

curl-minimal-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: e5b033573611e7de65065f59a3098d6ea149466abbbb06ffd28d79cef7c131ad

libcurl-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: d76d91950defc0950685c42a086976f559530074b4974d9fd7802de32b26bf30

libcurl-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 2788d271e7f8b4cf91424819f3fcd6ea2274c94daa0d79bc15dc3bb23f7e7e7b

libcurl-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 2788d271e7f8b4cf91424819f3fcd6ea2274c94daa0d79bc15dc3bb23f7e7e7b

libcurl-devel-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: cf44526cae6e01414906b508d0829677425f55ff9329028568339a1af4819f6f

libcurl-minimal-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: b295a5ead49bf202f436a7761cf62cc92f7d898e9f4d502f35cc930c36786779

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 6c8b519a8fda128fb1b653f6c899c6c7c9c540457b83f352b2c09d2439b3f2e3

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 6c8b519a8fda128fb1b653f6c899c6c7c9c540457b83f352b2c09d2439b3f2e3

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0

SRPM

curl-7.76.1-14.el9_0.4.src.rpm

SHA-256: cde82084e238a8435c51bf62f14ebb69426d95b4329116956c8ff69515026383

s390x

curl-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 609afb9745565d2645205ddf0d507e7298ebbeeab4f861b00f944d4f556a56ae

curl-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 3894ca90cea4d19ea37d8824b986c8881e250b41f4621ba107668ec40e83f4bb

curl-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 3894ca90cea4d19ea37d8824b986c8881e250b41f4621ba107668ec40e83f4bb

curl-debugsource-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: c527060be9b7ef798451855dadfa08178f9c6b74ebca3795ed5c94198d4c7c3e

curl-debugsource-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: c527060be9b7ef798451855dadfa08178f9c6b74ebca3795ed5c94198d4c7c3e

curl-minimal-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 71fee1eab0feee84268a2baf068fc0835d295eb7c3b31936ceaac9b52850d462

curl-minimal-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: e5b033573611e7de65065f59a3098d6ea149466abbbb06ffd28d79cef7c131ad

curl-minimal-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: e5b033573611e7de65065f59a3098d6ea149466abbbb06ffd28d79cef7c131ad

libcurl-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: d76d91950defc0950685c42a086976f559530074b4974d9fd7802de32b26bf30

libcurl-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 2788d271e7f8b4cf91424819f3fcd6ea2274c94daa0d79bc15dc3bb23f7e7e7b

libcurl-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 2788d271e7f8b4cf91424819f3fcd6ea2274c94daa0d79bc15dc3bb23f7e7e7b

libcurl-devel-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: cf44526cae6e01414906b508d0829677425f55ff9329028568339a1af4819f6f

libcurl-minimal-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: b295a5ead49bf202f436a7761cf62cc92f7d898e9f4d502f35cc930c36786779

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 6c8b519a8fda128fb1b653f6c899c6c7c9c540457b83f352b2c09d2439b3f2e3

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 6c8b519a8fda128fb1b653f6c899c6c7c9c540457b83f352b2c09d2439b3f2e3

Red Hat Enterprise Linux for Power, little endian 9

SRPM

curl-7.76.1-14.el9_0.4.src.rpm

SHA-256: cde82084e238a8435c51bf62f14ebb69426d95b4329116956c8ff69515026383

ppc64le

curl-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: f04a6780bbe155dca83d7571723e9d353438fb0b10e4de95ce1268d359caa4f7

curl-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: e60498f56ca44625a5baccede3e2dd4450b3abbbff1d8f58b58934f28bf05a50

curl-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: e60498f56ca44625a5baccede3e2dd4450b3abbbff1d8f58b58934f28bf05a50

curl-debugsource-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: f2dd16b83777b2153442bc36b0069ec851922560fd01eb0364c6532f404a585a

curl-debugsource-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: f2dd16b83777b2153442bc36b0069ec851922560fd01eb0364c6532f404a585a

curl-minimal-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: 5835fbc1288a2761b93d8b7fb55254e6d10d5697ae97de099173b3e364e0ab9f

curl-minimal-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: bf304932fc9595a10052734c52f040c93605ae9da94e79bb54fc13e7ae0bcaa8

curl-minimal-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: bf304932fc9595a10052734c52f040c93605ae9da94e79bb54fc13e7ae0bcaa8

libcurl-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: a71911ae62358a97bc210cb6fee97fadc478508f503ec0352b87048d2fd97bb3

libcurl-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: bf3811ce7a2e496d47d198b0bfedc2772bcdbfcc0447691f772c96f60b423a9b

libcurl-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: bf3811ce7a2e496d47d198b0bfedc2772bcdbfcc0447691f772c96f60b423a9b

libcurl-devel-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: 87a30e12e90b4200ca2b6329f1bbf5187011e8deac71c57e106ca30b6e5ee206

libcurl-minimal-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: e6f27fedbcf8643a5982c779dd8914648f0719fd59523e8ba8419f7673babca0

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: 4d18d89510114486c00101b7667aff303478a551c20d45041b40854b1e8bad1b

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: 4d18d89510114486c00101b7667aff303478a551c20d45041b40854b1e8bad1b

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0

SRPM

curl-7.76.1-14.el9_0.4.src.rpm

SHA-256: cde82084e238a8435c51bf62f14ebb69426d95b4329116956c8ff69515026383

ppc64le

curl-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: f04a6780bbe155dca83d7571723e9d353438fb0b10e4de95ce1268d359caa4f7

curl-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: e60498f56ca44625a5baccede3e2dd4450b3abbbff1d8f58b58934f28bf05a50

curl-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: e60498f56ca44625a5baccede3e2dd4450b3abbbff1d8f58b58934f28bf05a50

curl-debugsource-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: f2dd16b83777b2153442bc36b0069ec851922560fd01eb0364c6532f404a585a

curl-debugsource-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: f2dd16b83777b2153442bc36b0069ec851922560fd01eb0364c6532f404a585a

curl-minimal-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: 5835fbc1288a2761b93d8b7fb55254e6d10d5697ae97de099173b3e364e0ab9f

curl-minimal-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: bf304932fc9595a10052734c52f040c93605ae9da94e79bb54fc13e7ae0bcaa8

curl-minimal-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: bf304932fc9595a10052734c52f040c93605ae9da94e79bb54fc13e7ae0bcaa8

libcurl-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: a71911ae62358a97bc210cb6fee97fadc478508f503ec0352b87048d2fd97bb3

libcurl-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: bf3811ce7a2e496d47d198b0bfedc2772bcdbfcc0447691f772c96f60b423a9b

libcurl-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: bf3811ce7a2e496d47d198b0bfedc2772bcdbfcc0447691f772c96f60b423a9b

libcurl-devel-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: 87a30e12e90b4200ca2b6329f1bbf5187011e8deac71c57e106ca30b6e5ee206

libcurl-minimal-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: e6f27fedbcf8643a5982c779dd8914648f0719fd59523e8ba8419f7673babca0

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: 4d18d89510114486c00101b7667aff303478a551c20d45041b40854b1e8bad1b

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: 4d18d89510114486c00101b7667aff303478a551c20d45041b40854b1e8bad1b

Red Hat Enterprise Linux for ARM 64 9

SRPM

curl-7.76.1-14.el9_0.4.src.rpm

SHA-256: cde82084e238a8435c51bf62f14ebb69426d95b4329116956c8ff69515026383

aarch64

curl-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: e8f9c2619c67f3b1d2bff24bffa3fbdb2d84c269cf2c3228d0b7e0715be982d8

curl-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: dda0b7dc4ab885e656960a645821d3f75ae186c121c3e6d9a8f51b4f79b456b0

curl-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: dda0b7dc4ab885e656960a645821d3f75ae186c121c3e6d9a8f51b4f79b456b0

curl-debugsource-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 078ec93abcdc00f922e18f3cfbb6affb9fe2d9ddf7030bc6c6346ea3535fdc2c

curl-debugsource-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 078ec93abcdc00f922e18f3cfbb6affb9fe2d9ddf7030bc6c6346ea3535fdc2c

curl-minimal-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 3b20bcbcc983b636f0b0e62e098cd017e0c5b96dcb7bc527f75cf72cfaf58e81

curl-minimal-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 73acb02aadc49cb3b7de5646733db4d958bfa918ed54f3571d9ccc0fe5c969d2

curl-minimal-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 73acb02aadc49cb3b7de5646733db4d958bfa918ed54f3571d9ccc0fe5c969d2

libcurl-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 55612e67edcb686368ea313908fc243662f42cd3a266d2f0490878c9da732953

libcurl-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 6b2cb96cb12b3c71eb8ff3caad909fcaa4725de8b74e2c787cc3e88ec0bdae89

libcurl-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 6b2cb96cb12b3c71eb8ff3caad909fcaa4725de8b74e2c787cc3e88ec0bdae89

libcurl-devel-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: f37e03ed11233ebc03d0bb6a1b2df198265fef6a938c05a90c35bd79cc346565

libcurl-minimal-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 82f45b58333d9aed02f65f80d20ece809ae3e99e0ff446e833f40abf7dd68086

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 3f6e8c790ca46628ce906e97c90010efc4fa52c50c6b2a0b7756e7a84cbadad4

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 3f6e8c790ca46628ce906e97c90010efc4fa52c50c6b2a0b7756e7a84cbadad4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0

SRPM

curl-7.76.1-14.el9_0.4.src.rpm

SHA-256: cde82084e238a8435c51bf62f14ebb69426d95b4329116956c8ff69515026383

aarch64

curl-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: e8f9c2619c67f3b1d2bff24bffa3fbdb2d84c269cf2c3228d0b7e0715be982d8

curl-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: dda0b7dc4ab885e656960a645821d3f75ae186c121c3e6d9a8f51b4f79b456b0

curl-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: dda0b7dc4ab885e656960a645821d3f75ae186c121c3e6d9a8f51b4f79b456b0

curl-debugsource-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 078ec93abcdc00f922e18f3cfbb6affb9fe2d9ddf7030bc6c6346ea3535fdc2c

curl-debugsource-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 078ec93abcdc00f922e18f3cfbb6affb9fe2d9ddf7030bc6c6346ea3535fdc2c

curl-minimal-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 3b20bcbcc983b636f0b0e62e098cd017e0c5b96dcb7bc527f75cf72cfaf58e81

curl-minimal-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 73acb02aadc49cb3b7de5646733db4d958bfa918ed54f3571d9ccc0fe5c969d2

curl-minimal-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 73acb02aadc49cb3b7de5646733db4d958bfa918ed54f3571d9ccc0fe5c969d2

libcurl-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 55612e67edcb686368ea313908fc243662f42cd3a266d2f0490878c9da732953

libcurl-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 6b2cb96cb12b3c71eb8ff3caad909fcaa4725de8b74e2c787cc3e88ec0bdae89

libcurl-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 6b2cb96cb12b3c71eb8ff3caad909fcaa4725de8b74e2c787cc3e88ec0bdae89

libcurl-devel-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: f37e03ed11233ebc03d0bb6a1b2df198265fef6a938c05a90c35bd79cc346565

libcurl-minimal-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 82f45b58333d9aed02f65f80d20ece809ae3e99e0ff446e833f40abf7dd68086

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 3f6e8c790ca46628ce906e97c90010efc4fa52c50c6b2a0b7756e7a84cbadad4

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 3f6e8c790ca46628ce906e97c90010efc4fa52c50c6b2a0b7756e7a84cbadad4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0

SRPM

curl-7.76.1-14.el9_0.4.src.rpm

SHA-256: cde82084e238a8435c51bf62f14ebb69426d95b4329116956c8ff69515026383

ppc64le

curl-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: f04a6780bbe155dca83d7571723e9d353438fb0b10e4de95ce1268d359caa4f7

curl-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: e60498f56ca44625a5baccede3e2dd4450b3abbbff1d8f58b58934f28bf05a50

curl-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: e60498f56ca44625a5baccede3e2dd4450b3abbbff1d8f58b58934f28bf05a50

curl-debugsource-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: f2dd16b83777b2153442bc36b0069ec851922560fd01eb0364c6532f404a585a

curl-debugsource-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: f2dd16b83777b2153442bc36b0069ec851922560fd01eb0364c6532f404a585a

curl-minimal-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: 5835fbc1288a2761b93d8b7fb55254e6d10d5697ae97de099173b3e364e0ab9f

curl-minimal-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: bf304932fc9595a10052734c52f040c93605ae9da94e79bb54fc13e7ae0bcaa8

curl-minimal-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: bf304932fc9595a10052734c52f040c93605ae9da94e79bb54fc13e7ae0bcaa8

libcurl-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: a71911ae62358a97bc210cb6fee97fadc478508f503ec0352b87048d2fd97bb3

libcurl-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: bf3811ce7a2e496d47d198b0bfedc2772bcdbfcc0447691f772c96f60b423a9b

libcurl-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: bf3811ce7a2e496d47d198b0bfedc2772bcdbfcc0447691f772c96f60b423a9b

libcurl-devel-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: 87a30e12e90b4200ca2b6329f1bbf5187011e8deac71c57e106ca30b6e5ee206

libcurl-minimal-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: e6f27fedbcf8643a5982c779dd8914648f0719fd59523e8ba8419f7673babca0

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: 4d18d89510114486c00101b7667aff303478a551c20d45041b40854b1e8bad1b

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.ppc64le.rpm

SHA-256: 4d18d89510114486c00101b7667aff303478a551c20d45041b40854b1e8bad1b

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0

SRPM

curl-7.76.1-14.el9_0.4.src.rpm

SHA-256: cde82084e238a8435c51bf62f14ebb69426d95b4329116956c8ff69515026383

x86_64

curl-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 3b384f4a6e65d32eb002aa79e9266c8e056d42401af6e2a9b04a3b75e47adc81

curl-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 9718aad155263f758c0c6833f406a6d82e6fbddff8bccda2c988a78b96bb9109

curl-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 9718aad155263f758c0c6833f406a6d82e6fbddff8bccda2c988a78b96bb9109

curl-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: d5e6e66cdc113dd589457e35f43fb85193b10666b2d11b2884d5abf3b05631db

curl-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: d5e6e66cdc113dd589457e35f43fb85193b10666b2d11b2884d5abf3b05631db

curl-debugsource-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 3c5b22f90a6632fbafb2a0bc2b1816bb68d8755121f168dfab33bcfddcd4076b

curl-debugsource-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 3c5b22f90a6632fbafb2a0bc2b1816bb68d8755121f168dfab33bcfddcd4076b

curl-debugsource-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 8f029f88dc8e0152d0273386a294973c30f68ef2bec023afd87628284e79211b

curl-debugsource-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 8f029f88dc8e0152d0273386a294973c30f68ef2bec023afd87628284e79211b

curl-minimal-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: b6c7743db71496e4e444217aec717e4dbf3c0b3324d02fcd84c4a0cc257b5936

curl-minimal-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: a1131696e862ff1162aba57c58ccbd6f665ce48bcea6dcfc7c06206cf92dc162

curl-minimal-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: a1131696e862ff1162aba57c58ccbd6f665ce48bcea6dcfc7c06206cf92dc162

curl-minimal-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 255e1b3d70510b878dc683a5a8917a93dd94e79461a47d154b46f818ec691fbe

curl-minimal-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 255e1b3d70510b878dc683a5a8917a93dd94e79461a47d154b46f818ec691fbe

libcurl-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 0429303992dbc2d60c306a66cbd338965d6c1f53210be43d54587a27caedf85e

libcurl-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 88411d33e0306612ae7ec760965853082941c6fdeb59427182c82e01b33e4305

libcurl-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: c20d7d9f98115dbd3a99394e5a5aea1b29d7d59e14fd98c36b6c19fab8694db6

libcurl-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: c20d7d9f98115dbd3a99394e5a5aea1b29d7d59e14fd98c36b6c19fab8694db6

libcurl-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: ae0930cf5fabc814315ccc747f7f1ec66567ac449adf6272e73e99e980067056

libcurl-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: ae0930cf5fabc814315ccc747f7f1ec66567ac449adf6272e73e99e980067056

libcurl-devel-7.76.1-14.el9_0.4.i686.rpm

SHA-256: c5c15e89818b8b3bc8cbf35ca6dc1867df17ad44a694640bfef5c1bc291f0267

libcurl-devel-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 3a605a88225d726db82d69600f4d9db1265aa80354ffdeb429ad67faa9fdefd0

libcurl-minimal-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 98587a9030be6f4c96b90c0dbed9b2232412e401eabfc640ef7c70b9042fabc5

libcurl-minimal-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: d7de67ad8ea7a28f6f53764173cbfdbe3701d547d3ab9037b9e5da2bd50ca7a4

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 91da2f30a34de15b254a23c5adf86fe5fc904f730045e1ab822f92fc5f97b00c

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.i686.rpm

SHA-256: 91da2f30a34de15b254a23c5adf86fe5fc904f730045e1ab822f92fc5f97b00c

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 8ab08cbac2913e6b5d19fb2dd964f84118dc2a0c34e5010bfda706f3a11e2bc2

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.x86_64.rpm

SHA-256: 8ab08cbac2913e6b5d19fb2dd964f84118dc2a0c34e5010bfda706f3a11e2bc2

Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0

SRPM

curl-7.76.1-14.el9_0.4.src.rpm

SHA-256: cde82084e238a8435c51bf62f14ebb69426d95b4329116956c8ff69515026383

aarch64

curl-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: e8f9c2619c67f3b1d2bff24bffa3fbdb2d84c269cf2c3228d0b7e0715be982d8

curl-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: dda0b7dc4ab885e656960a645821d3f75ae186c121c3e6d9a8f51b4f79b456b0

curl-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: dda0b7dc4ab885e656960a645821d3f75ae186c121c3e6d9a8f51b4f79b456b0

curl-debugsource-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 078ec93abcdc00f922e18f3cfbb6affb9fe2d9ddf7030bc6c6346ea3535fdc2c

curl-debugsource-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 078ec93abcdc00f922e18f3cfbb6affb9fe2d9ddf7030bc6c6346ea3535fdc2c

curl-minimal-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 3b20bcbcc983b636f0b0e62e098cd017e0c5b96dcb7bc527f75cf72cfaf58e81

curl-minimal-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 73acb02aadc49cb3b7de5646733db4d958bfa918ed54f3571d9ccc0fe5c969d2

curl-minimal-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 73acb02aadc49cb3b7de5646733db4d958bfa918ed54f3571d9ccc0fe5c969d2

libcurl-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 55612e67edcb686368ea313908fc243662f42cd3a266d2f0490878c9da732953

libcurl-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 6b2cb96cb12b3c71eb8ff3caad909fcaa4725de8b74e2c787cc3e88ec0bdae89

libcurl-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 6b2cb96cb12b3c71eb8ff3caad909fcaa4725de8b74e2c787cc3e88ec0bdae89

libcurl-devel-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: f37e03ed11233ebc03d0bb6a1b2df198265fef6a938c05a90c35bd79cc346565

libcurl-minimal-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 82f45b58333d9aed02f65f80d20ece809ae3e99e0ff446e833f40abf7dd68086

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 3f6e8c790ca46628ce906e97c90010efc4fa52c50c6b2a0b7756e7a84cbadad4

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.aarch64.rpm

SHA-256: 3f6e8c790ca46628ce906e97c90010efc4fa52c50c6b2a0b7756e7a84cbadad4

Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0

SRPM

curl-7.76.1-14.el9_0.4.src.rpm

SHA-256: cde82084e238a8435c51bf62f14ebb69426d95b4329116956c8ff69515026383

s390x

curl-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 609afb9745565d2645205ddf0d507e7298ebbeeab4f861b00f944d4f556a56ae

curl-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 3894ca90cea4d19ea37d8824b986c8881e250b41f4621ba107668ec40e83f4bb

curl-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 3894ca90cea4d19ea37d8824b986c8881e250b41f4621ba107668ec40e83f4bb

curl-debugsource-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: c527060be9b7ef798451855dadfa08178f9c6b74ebca3795ed5c94198d4c7c3e

curl-debugsource-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: c527060be9b7ef798451855dadfa08178f9c6b74ebca3795ed5c94198d4c7c3e

curl-minimal-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 71fee1eab0feee84268a2baf068fc0835d295eb7c3b31936ceaac9b52850d462

curl-minimal-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: e5b033573611e7de65065f59a3098d6ea149466abbbb06ffd28d79cef7c131ad

curl-minimal-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: e5b033573611e7de65065f59a3098d6ea149466abbbb06ffd28d79cef7c131ad

libcurl-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: d76d91950defc0950685c42a086976f559530074b4974d9fd7802de32b26bf30

libcurl-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 2788d271e7f8b4cf91424819f3fcd6ea2274c94daa0d79bc15dc3bb23f7e7e7b

libcurl-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 2788d271e7f8b4cf91424819f3fcd6ea2274c94daa0d79bc15dc3bb23f7e7e7b

libcurl-devel-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: cf44526cae6e01414906b508d0829677425f55ff9329028568339a1af4819f6f

libcurl-minimal-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: b295a5ead49bf202f436a7761cf62cc92f7d898e9f4d502f35cc930c36786779

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 6c8b519a8fda128fb1b653f6c899c6c7c9c540457b83f352b2c09d2439b3f2e3

libcurl-minimal-debuginfo-7.76.1-14.el9_0.4.s390x.rpm

SHA-256: 6c8b519a8fda128fb1b653f6c899c6c7c9c540457b83f352b2c09d2439b3f2e3

Related news

CVE-2023-22130: Oracle Critical Patch Update Advisory - October 2023

Vulnerability in the Sun ZFS Storage Appliance product of Oracle Systems (component: Core). The supported version that is affected is 8.8.60. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Sun ZFS Storage Appliance. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).

CVE-2023-21954: Oracle Critical Patch Update Advisory - April 2023

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

CVE-2023-21850: Oracle Critical Patch Update Advisory - January 2023

Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

CVE-2022-29838: WDC-22019 My Cloud Firmware Version 5.25.124 | Western Digital

Improper Authentication vulnerability in the encrypted volumes and auto mount features of Western Digital My Cloud devices allows insecure direct access to the drive information in the case of a device reset. This issue affects: Western Digital My Cloud My Cloud versions prior to 5.25.124 on Linux.

CVE-2022-29837: WDC-22018 Western Digital My Cloud Home, My Cloud Home Duo and SanDisk ibi Firmware Version 8.12.0-178 | Western Digital

A path traversal vulnerability was addressed in Western Digital My Cloud Home, My Cloud Home Duo and SanDisk ibi which could allow an attacker to initiate installation of custom ZIP packages and overwrite system files. This could potentially lead to a code execution.

CVE-2022-21587: Oracle Critical Patch Update Advisory - October 2022

Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Red Hat Security Advisory 2022-6696-01

Red Hat Security Advisory 2022-6696-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. Issues addressed include crlf injection and denial of service vulnerabilities.

Red Hat Security Advisory 2022-6526-01

Red Hat Security Advisory 2022-6526-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains the following OpenShift Virtualization 4.11.0 images: RHEL-8-CNV-4.11. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

RHSA-2022:6526: Red Hat Security Advisory: OpenShift Virtualization 4.11.0 Images security and bug fix update

Red Hat OpenShift Virtualization release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2021-44716: golang: net/http: limit growth of header canonicalization cache * CVE-2021-44717: golang: syscall: don't close fd 0 on ForkExec error * CVE-2022-1798: kubeVirt: Arbitrary file read on t...

Red Hat Security Advisory 2022-6271-01

Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

RHSA-2022:6156: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement, & bugfix update

Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.11.0 on Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23440: nodejs-set-value: type confusion allows bypass of CVE-2019-10747 * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-...

Red Hat Security Advisory 2022-6040-01

Red Hat Security Advisory 2022-6040-01 - Version 1.24.0 of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7, 4.8, 4.9, 4.10, and 4.11. This release includes security and bug fixes, and enhancements. Issues addressed include bypass and denial of service vulnerabilities.

Red Hat Security Advisory 2022-5070-01

Red Hat Security Advisory 2022-5070-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.0. Issues addressed include denial of service, out of bounds read, and traversal vulnerabilities.

RHSA-2022:5069: Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...

RHSA-2022:6024: Red Hat Security Advisory: New container image for Red Hat Ceph Storage 5.2 Security update

A new container image for Red Hat Ceph Storage 5.2 is now available in the Red Hat Ecosystem Catalog. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-43813: grafana: directory traversal vulnerability * CVE-2022-21673: grafana: Forward OAuth Identity Token can allow users to access some data sources

Red Hat Security Advisory 2022-5909-01

Red Hat Security Advisory 2022-5909-01 - Openshift Logging Bug Fix Release. Issues addressed include denial of service and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-5908-01

Red Hat Security Advisory 2022-5908-01 - Openshift Logging Bug Fix Release. Issues addressed include denial of service and out of bounds read vulnerabilities.

RHSA-2022:5909: Red Hat Security Advisory: Openshift Logging Bug Fix and security update Release (5.2.13)

Openshift Logging Bug Fix Release (5.2.13) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS

RHSA-2022:5908: Red Hat Security Advisory: Openshift Logging Bug Fix and security update Release (5.3.10)

Openshift Logging Bug Fix Release (5.3.10) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS

Red Hat Security Advisory 2022-5840-01

Red Hat Security Advisory 2022-5840-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.

RHSA-2022:5840: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.3 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.3 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1365: cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar * CVE-2022-29526: golang: syscall: faccessat checks wrong group

RHSA-2022:5699: Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.0.1 security update

Secondary Scheduler Operator for Red Hat OpenShift 1.0.1 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-29526: golang: syscall: faccessat checks wrong group

Red Hat Security Advisory 2022-5531-01

Red Hat Security Advisory 2022-5531-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs.

Red Hat Security Advisory 2022-5556-01

Red Hat Security Advisory 2022-5556-01 - Logging Subsystem 5.4.3 has security updates. Issues addressed include denial of service and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-5704-01

Red Hat Security Advisory 2022-5704-01 - Updated images are now available for Red Hat Advanced Cluster Security. Issues addressed include a privilege escalation vulnerability.

RHSA-2022:5704: Red Hat Security Advisory: ACS 3.71 enhancement and security update

Updated images are now available for Red Hat Advanced Cluster Security. The updated image includes bug fixes and feature improvements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-29173: go-tuf: No protection against rollback attacks for roles other than root

Red Hat Security Advisory 2022-5673-01

Red Hat Security Advisory 2022-5673-01 - Red Hat OpenStack Platform 16.2 (Train) director operator containers, with several Important security fixes, are available for technology preview. Issues addressed include a code execution vulnerability.

CVE-2022-31151

Authorization headers are cleared on cross-origin redirect. However, cookie headers which are sensitive headers and are official headers found in the spec, remain uncleared. There are active users using cookie headers in undici. This may lead to accidental leakage of cookie to a 3rd-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the 3rd party site. This was patched in v5.7.1. By default, this vulnerability is not exploitable. Do not enable redirections, i.e. `maxRedirections: 0` (the default).

RHSA-2022:5673: Red Hat Security Advisory: Release of containers for OSP 16.2.z director operator tech preview

Red Hat OpenStack Platform 16.2 (Train) director operator containers, with several Important security fixes, are available for technology preview.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-41103: containerd: insufficiently restricted permissions on container root and plugin directories * CVE-2021-43565: golang.org/x/crypto: empty plaintext packet causes panic * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go-getter: unsafe download (issue 3 of 3)

RHSA-2022:5556: Red Hat Security Advisory: Logging Subsystem 5.4.3 - Red Hat OpenShift security update

Logging Subsystem 5.4.3 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS

RHSA-2022:5531: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.1 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24450: nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account

Red Hat Security Advisory 2022-5245-01

Red Hat Security Advisory 2022-5245-01 - The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Issues addressed include bypass and password leak vulnerabilities.

Red Hat Security Advisory 2022-5245-01

Red Hat Security Advisory 2022-5245-01 - The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Issues addressed include bypass and password leak vulnerabilities.

Red Hat Security Advisory 2022-5245-01

Red Hat Security Advisory 2022-5245-01 - The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Issues addressed include bypass and password leak vulnerabilities.

Red Hat Security Advisory 2022-5245-01

Red Hat Security Advisory 2022-5245-01 - The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Issues addressed include bypass and password leak vulnerabilities.

RHSA-2022:5313: Red Hat Security Advisory: curl security update

An update for curl is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-22576: curl: OAUTH2 bearer bypass in connection re-use * CVE-2022-27774: curl: credential leak on redirect * CVE-2022-27776: curl: auth/cookie leak on redirect * CVE-2022-27782: curl: TLS and SSH connection too eager reuse

CVE-2022-31033

The Mechanize library is used for automating interaction with websites. Mechanize automatically stores and sends cookies, follows redirects, and can follow links and submit forms. In versions prior to 2.8.5 the Authorization header is leaked after a redirect to a different port on the same site. Users are advised to upgrade to Mechanize v2.8.5 or later. There are no known workarounds for this issue.

CVE-2022-27782

libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.

CVE-2022-27776

A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.

CVE-2022-27774

An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.

CVE-2022-22576

An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).

CVE-2022-29207: Release TensorFlow 2.6.4 · tensorflow/tensorflow

TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerability. If the resource handle is empty, then a reference is bound to a null pointer inside TensorFlow codebase (various codepaths). This is undefined behavior. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.

CVE-2022-29207: Release TensorFlow 2.6.4 · tensorflow/tensorflow

TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerability. If the resource handle is empty, then a reference is bound to a null pointer inside TensorFlow codebase (various codepaths). This is undefined behavior. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.

CVE-2022-29207: Release TensorFlow 2.6.4 · tensorflow/tensorflow

TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerability. If the resource handle is empty, then a reference is bound to a null pointer inside TensorFlow codebase (various codepaths). This is undefined behavior. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.

CVE-2022-29207: Release TensorFlow 2.6.4 · tensorflow/tensorflow

TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerability. If the resource handle is empty, then a reference is bound to a null pointer inside TensorFlow codebase (various codepaths). This is undefined behavior. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.

Ubuntu Security Notice USN-5412-1

Ubuntu Security Notice 5412-1 - Axel Chong discovered that curl incorrectly handled percent-encoded URL separators. A remote attacker could possibly use this issue to trick curl into using the wrong URL and bypass certain checks or filters. This issue only affected Ubuntu 22.04 LTS. Florian Kohnhuser discovered that curl incorrectly handled returning a TLS server's certificate chain details. A remote attacker could possibly use this issue to cause curl to stop responding, resulting in a denial of service.