Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2015:1254 - Security Advisory
Issued:
2015-07-22
Updated:
2015-07-22

RHSA-2015:1254 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: curl security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated curl packages that fix multiple security issues, several bugs, and
add two enhancements are now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

The curl packages provide the libcurl library and the curl utility for
downloading files from servers using various protocols, including HTTP,
FTP, and LDAP.

It was found that the libcurl library did not correctly handle partial
literal IP addresses when parsing received HTTP cookies. An attacker able
to trick a user into connecting to a malicious server could use this flaw
to set the user's cookie to a crafted domain, making other cookie-related
issues easier to exploit. (CVE-2014-3613)

A flaw was found in the way the libcurl library performed the duplication
of connection handles. If an application set the CURLOPT_COPYPOSTFIELDS
option for a handle, using the handle's duplicate could cause the
application to crash or disclose a portion of its memory. (CVE-2014-3707)

It was discovered that the libcurl library failed to properly handle URLs
with embedded end-of-line characters. An attacker able to make an
application using libcurl to access a specially crafted URL via an HTTP
proxy could use this flaw to inject additional headers to the request or
construct additional requests. (CVE-2014-8150)

It was discovered that libcurl implemented aspects of the NTLM and
Negotatiate authentication incorrectly. If an application uses libcurl
and the affected mechanisms in a specifc way, certain requests to a
previously NTLM-authenticated server could appears as sent by the wrong
authenticated user. Additionally, the initial set of credentials for HTTP
Negotiate-authenticated requests could be reused in subsequent requests,
although a different set of credentials was specified. (CVE-2015-3143,
CVE-2015-3148)

Red Hat would like to thank the cURL project for reporting these issues.

Bug fixes:

  • An out-of-protocol fallback to SSL version 3.0 (SSLv3.0) was available

with libcurl. Attackers could abuse the fallback to force downgrade of the
SSL version. The fallback has been removed from libcurl. Users requiring
this functionality can explicitly enable SSLv3.0 through the libcurl API.
(BZ#1154059)

  • A single upload transfer through the FILE protocol opened the destination

file twice. If the inotify kernel subsystem monitored the file, two events
were produced unnecessarily. The file is now opened only once per upload.
(BZ#883002)

  • Utilities using libcurl for SCP/SFTP transfers could terminate

unexpectedly when the system was running in FIPS mode. (BZ#1008178)

  • Using the "--retry" option with the curl utility could cause curl to

terminate unexpectedly with a segmentation fault. Now, adding "--retry" no
longer causes curl to crash. (BZ#1009455)

  • The "curl --trace-time" command did not use the correct local time when

printing timestamps. Now, "curl --trace-time" works as expected.
(BZ#1120196)

  • The valgrind utility could report dynamically allocated memory leaks on

curl exit. Now, curl performs a global shutdown of the NetScape Portable
Runtime (NSPR) library on exit, and valgrind no longer reports the memory
leaks. (BZ#1146528)

  • Previously, libcurl returned an incorrect value of the

CURLINFO_HEADER_SIZE field when a proxy server appended its own headers to
the HTTP response. Now, the returned value is valid. (BZ#1161163)

Enhancements:

  • The "--tlsv1.0", "--tlsv1.1", and "--tlsv1.2" options are available for

specifying the minor version of the TLS protocol to be negotiated by NSS.
The "--tlsv1" option now negotiates the highest version of the TLS protocol
supported by both the client and the server. (BZ#1012136)

  • It is now possible to explicitly enable or disable the ECC and the new

AES cipher suites to be used for TLS. (BZ#1058767, BZ#1156422)

All curl users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add these
enhancements.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x

Fixes

  • BZ - 835898 - Bug in DNS cache causes connections until restart of libcurl-using processes
  • BZ - 883002 - curl used with file:// protocol opens and closes a destination file twice
  • BZ - 997185 - sendrecv.c example incorrect type for sockfd
  • BZ - 1008178 - curl scp download fails in fips mode
  • BZ - 1011083 - CA certificate cannot be specified by nickname [documentation bug]
  • BZ - 1011101 - manpage typos found using aspell
  • BZ - 1058767 - curl does not support ECDSA certificates
  • BZ - 1104160 - Link in curl man page is wrong
  • BZ - 1136154 - CVE-2014-3613 curl: incorrect handling of IP addresses in cookie domain
  • BZ - 1154059 - curl: Disable out-of-protocol fallback to SSL 3.0
  • BZ - 1154747 - NTLM: ignore CURLOPT_FORBID_REUSE during NTLM HTTP auth
  • BZ - 1154941 - CVE-2014-3707 curl: incorrect handle duplication after COPYPOSTFIELDS
  • BZ - 1156422 - curl does not allow explicit control of DHE ciphers
  • BZ - 1161163 - Response headers added by proxy servers missing in CURLINFO_HEADER_SIZE
  • BZ - 1168137 - curl closes connection after HEAD request fails
  • BZ - 1178692 - CVE-2014-8150 curl: URL request injection vulnerability in parseurlandfillconn()
  • BZ - 1213306 - CVE-2015-3143 curl: re-using authenticated connection when unauthenticated
  • BZ - 1213351 - CVE-2015-3148 curl: Negotiate not treated as connection-oriented

CVEs

  • CVE-2015-3143
  • CVE-2014-3707
  • CVE-2014-3613
  • CVE-2014-8150
  • CVE-2015-3148

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
x86_64
curl-7.19.7-46.el6.x86_64.rpm SHA-256: f2928f7d55217c46054a6fd9b646bd365be5a40251e82954054d6d8835f92ab5
curl-7.19.7-46.el6.x86_64.rpm SHA-256: f2928f7d55217c46054a6fd9b646bd365be5a40251e82954054d6d8835f92ab5
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-7.19.7-46.el6.x86_64.rpm SHA-256: fc38b17223fe18150300cf03eb6488cdab772bb7f72d32fe3ef867eb7151fdbd
libcurl-7.19.7-46.el6.x86_64.rpm SHA-256: fc38b17223fe18150300cf03eb6488cdab772bb7f72d32fe3ef867eb7151fdbd
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1
libcurl-devel-7.19.7-46.el6.x86_64.rpm SHA-256: b12d689fbcaf7986d0b15ad7ec131ef873c0661668336b5474e70711d251e678
libcurl-devel-7.19.7-46.el6.x86_64.rpm SHA-256: b12d689fbcaf7986d0b15ad7ec131ef873c0661668336b5474e70711d251e678
i386
curl-7.19.7-46.el6.i686.rpm SHA-256: 6ff132181d0c5f8664d4c29c5a4bdc3eec2837d44a14233e1374e2cf1f0071c6
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
x86_64
curl-7.19.7-46.el6.x86_64.rpm SHA-256: f2928f7d55217c46054a6fd9b646bd365be5a40251e82954054d6d8835f92ab5
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-7.19.7-46.el6.x86_64.rpm SHA-256: fc38b17223fe18150300cf03eb6488cdab772bb7f72d32fe3ef867eb7151fdbd
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1
libcurl-devel-7.19.7-46.el6.x86_64.rpm SHA-256: b12d689fbcaf7986d0b15ad7ec131ef873c0661668336b5474e70711d251e678
i386
curl-7.19.7-46.el6.i686.rpm SHA-256: 6ff132181d0c5f8664d4c29c5a4bdc3eec2837d44a14233e1374e2cf1f0071c6
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1

Red Hat Enterprise Linux Workstation 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
x86_64
curl-7.19.7-46.el6.x86_64.rpm SHA-256: f2928f7d55217c46054a6fd9b646bd365be5a40251e82954054d6d8835f92ab5
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-7.19.7-46.el6.x86_64.rpm SHA-256: fc38b17223fe18150300cf03eb6488cdab772bb7f72d32fe3ef867eb7151fdbd
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1
libcurl-devel-7.19.7-46.el6.x86_64.rpm SHA-256: b12d689fbcaf7986d0b15ad7ec131ef873c0661668336b5474e70711d251e678
i386
curl-7.19.7-46.el6.i686.rpm SHA-256: 6ff132181d0c5f8664d4c29c5a4bdc3eec2837d44a14233e1374e2cf1f0071c6
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1

Red Hat Enterprise Linux Desktop 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
x86_64
curl-7.19.7-46.el6.x86_64.rpm SHA-256: f2928f7d55217c46054a6fd9b646bd365be5a40251e82954054d6d8835f92ab5
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-7.19.7-46.el6.x86_64.rpm SHA-256: fc38b17223fe18150300cf03eb6488cdab772bb7f72d32fe3ef867eb7151fdbd
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1
libcurl-devel-7.19.7-46.el6.x86_64.rpm SHA-256: b12d689fbcaf7986d0b15ad7ec131ef873c0661668336b5474e70711d251e678
i386
curl-7.19.7-46.el6.i686.rpm SHA-256: 6ff132181d0c5f8664d4c29c5a4bdc3eec2837d44a14233e1374e2cf1f0071c6
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
s390x
curl-7.19.7-46.el6.s390x.rpm SHA-256: abd7e04761dbc24e979257436b6af036a8a203f0b8075564d5cdd4e48183c128
curl-debuginfo-7.19.7-46.el6.s390.rpm SHA-256: a80b47d9c3a06ebde6b03d90bbf3d84e8c1da52e8adfe2a605712151b6097d3f
curl-debuginfo-7.19.7-46.el6.s390x.rpm SHA-256: e5dcf87f8be67d6241cf5276d91ab103edad46dfbddd28055bf285e13931fe5a
libcurl-7.19.7-46.el6.s390.rpm SHA-256: 36b7288f67f87cd5907c00d35ea260db59d6fe0d1729b2293c637e8e6ec87acd
libcurl-7.19.7-46.el6.s390x.rpm SHA-256: bd24d38fa2d6275c993ee8ae24da4565672fd57411bbcc5724418df514aab63b
libcurl-devel-7.19.7-46.el6.s390.rpm SHA-256: 9eb5b5597eac82af9253e698f150919ac07604f743569465e31c47ddb944256b
libcurl-devel-7.19.7-46.el6.s390x.rpm SHA-256: 912ae809f017df575cd9fb3643bcee59927e52262e5a7c2b9a4f13acf67f5ef0

Red Hat Enterprise Linux for Power, big endian 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
ppc64
curl-7.19.7-46.el6.ppc64.rpm SHA-256: 8a3b6b243e3aa34788060061f7f98bd86c0956b2252c36c173ed6e6157e8a7ef
curl-debuginfo-7.19.7-46.el6.ppc.rpm SHA-256: 319540bada642daab931d46113be6921b03b59206027a75163e0d9c1dbd59ebf
curl-debuginfo-7.19.7-46.el6.ppc64.rpm SHA-256: 71666f2ccd3b4f5d8ccbd7b60f82392314d4b7097df28509751037126e411741
libcurl-7.19.7-46.el6.ppc.rpm SHA-256: 386d7d4b65409286fe0bbb70f48e7f58b5cde7f7b80a22b8ad2120045b4c3376
libcurl-7.19.7-46.el6.ppc64.rpm SHA-256: 4b06553cfb537a7a460be60e97b94aefaa8d361c8d94f09c0910d75129af6783
libcurl-devel-7.19.7-46.el6.ppc.rpm SHA-256: 758f2ba96e7d452cb76d178cd6c2fd46d614371a1a24ed695a5f3e7ae94d0c4e
libcurl-devel-7.19.7-46.el6.ppc64.rpm SHA-256: 1942ad8f4828b8b29fb32dc60f8e4516ff4b1b3b27b38c16ee3fcae318a72854

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
x86_64
curl-7.19.7-46.el6.x86_64.rpm SHA-256: f2928f7d55217c46054a6fd9b646bd365be5a40251e82954054d6d8835f92ab5
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-7.19.7-46.el6.x86_64.rpm SHA-256: fc38b17223fe18150300cf03eb6488cdab772bb7f72d32fe3ef867eb7151fdbd
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1
libcurl-devel-7.19.7-46.el6.x86_64.rpm SHA-256: b12d689fbcaf7986d0b15ad7ec131ef873c0661668336b5474e70711d251e678

Red Hat Enterprise Linux Server from RHUI 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
x86_64
curl-7.19.7-46.el6.x86_64.rpm SHA-256: f2928f7d55217c46054a6fd9b646bd365be5a40251e82954054d6d8835f92ab5
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-7.19.7-46.el6.x86_64.rpm SHA-256: fc38b17223fe18150300cf03eb6488cdab772bb7f72d32fe3ef867eb7151fdbd
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1
libcurl-devel-7.19.7-46.el6.x86_64.rpm SHA-256: b12d689fbcaf7986d0b15ad7ec131ef873c0661668336b5474e70711d251e678
i386
curl-7.19.7-46.el6.i686.rpm SHA-256: 6ff132181d0c5f8664d4c29c5a4bdc3eec2837d44a14233e1374e2cf1f0071c6
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
s390x
curl-7.19.7-46.el6.s390x.rpm SHA-256: abd7e04761dbc24e979257436b6af036a8a203f0b8075564d5cdd4e48183c128
curl-debuginfo-7.19.7-46.el6.s390.rpm SHA-256: a80b47d9c3a06ebde6b03d90bbf3d84e8c1da52e8adfe2a605712151b6097d3f
curl-debuginfo-7.19.7-46.el6.s390x.rpm SHA-256: e5dcf87f8be67d6241cf5276d91ab103edad46dfbddd28055bf285e13931fe5a
libcurl-7.19.7-46.el6.s390.rpm SHA-256: 36b7288f67f87cd5907c00d35ea260db59d6fe0d1729b2293c637e8e6ec87acd
libcurl-7.19.7-46.el6.s390x.rpm SHA-256: bd24d38fa2d6275c993ee8ae24da4565672fd57411bbcc5724418df514aab63b
libcurl-devel-7.19.7-46.el6.s390.rpm SHA-256: 9eb5b5597eac82af9253e698f150919ac07604f743569465e31c47ddb944256b
libcurl-devel-7.19.7-46.el6.s390x.rpm SHA-256: 912ae809f017df575cd9fb3643bcee59927e52262e5a7c2b9a4f13acf67f5ef0

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
x86_64
curl-7.19.7-46.el6.x86_64.rpm SHA-256: f2928f7d55217c46054a6fd9b646bd365be5a40251e82954054d6d8835f92ab5
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-7.19.7-46.el6.x86_64.rpm SHA-256: fc38b17223fe18150300cf03eb6488cdab772bb7f72d32fe3ef867eb7151fdbd
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1
libcurl-devel-7.19.7-46.el6.x86_64.rpm SHA-256: b12d689fbcaf7986d0b15ad7ec131ef873c0661668336b5474e70711d251e678
i386
curl-7.19.7-46.el6.i686.rpm SHA-256: 6ff132181d0c5f8664d4c29c5a4bdc3eec2837d44a14233e1374e2cf1f0071c6
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
s390x
curl-7.19.7-46.el6.s390x.rpm SHA-256: abd7e04761dbc24e979257436b6af036a8a203f0b8075564d5cdd4e48183c128
curl-debuginfo-7.19.7-46.el6.s390.rpm SHA-256: a80b47d9c3a06ebde6b03d90bbf3d84e8c1da52e8adfe2a605712151b6097d3f
curl-debuginfo-7.19.7-46.el6.s390x.rpm SHA-256: e5dcf87f8be67d6241cf5276d91ab103edad46dfbddd28055bf285e13931fe5a
libcurl-7.19.7-46.el6.s390.rpm SHA-256: 36b7288f67f87cd5907c00d35ea260db59d6fe0d1729b2293c637e8e6ec87acd
libcurl-7.19.7-46.el6.s390x.rpm SHA-256: bd24d38fa2d6275c993ee8ae24da4565672fd57411bbcc5724418df514aab63b
libcurl-devel-7.19.7-46.el6.s390.rpm SHA-256: 9eb5b5597eac82af9253e698f150919ac07604f743569465e31c47ddb944256b
libcurl-devel-7.19.7-46.el6.s390x.rpm SHA-256: 912ae809f017df575cd9fb3643bcee59927e52262e5a7c2b9a4f13acf67f5ef0

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility