Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2015:1254 - Security Advisory
Issued:
2015-07-22
Updated:
2015-07-22

RHSA-2015:1254 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: curl security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated curl packages that fix multiple security issues, several bugs, and
add two enhancements are now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

The curl packages provide the libcurl library and the curl utility for
downloading files from servers using various protocols, including HTTP,
FTP, and LDAP.

It was found that the libcurl library did not correctly handle partial
literal IP addresses when parsing received HTTP cookies. An attacker able
to trick a user into connecting to a malicious server could use this flaw
to set the user's cookie to a crafted domain, making other cookie-related
issues easier to exploit. (CVE-2014-3613)

A flaw was found in the way the libcurl library performed the duplication
of connection handles. If an application set the CURLOPT_COPYPOSTFIELDS
option for a handle, using the handle's duplicate could cause the
application to crash or disclose a portion of its memory. (CVE-2014-3707)

It was discovered that the libcurl library failed to properly handle URLs
with embedded end-of-line characters. An attacker able to make an
application using libcurl to access a specially crafted URL via an HTTP
proxy could use this flaw to inject additional headers to the request or
construct additional requests. (CVE-2014-8150)

It was discovered that libcurl implemented aspects of the NTLM and
Negotatiate authentication incorrectly. If an application uses libcurl
and the affected mechanisms in a specifc way, certain requests to a
previously NTLM-authenticated server could appears as sent by the wrong
authenticated user. Additionally, the initial set of credentials for HTTP
Negotiate-authenticated requests could be reused in subsequent requests,
although a different set of credentials was specified. (CVE-2015-3143,
CVE-2015-3148)

Red Hat would like to thank the cURL project for reporting these issues.

Bug fixes:

  • An out-of-protocol fallback to SSL version 3.0 (SSLv3.0) was available

with libcurl. Attackers could abuse the fallback to force downgrade of the
SSL version. The fallback has been removed from libcurl. Users requiring
this functionality can explicitly enable SSLv3.0 through the libcurl API.
(BZ#1154059)

  • A single upload transfer through the FILE protocol opened the destination

file twice. If the inotify kernel subsystem monitored the file, two events
were produced unnecessarily. The file is now opened only once per upload.
(BZ#883002)

  • Utilities using libcurl for SCP/SFTP transfers could terminate

unexpectedly when the system was running in FIPS mode. (BZ#1008178)

  • Using the "--retry" option with the curl utility could cause curl to

terminate unexpectedly with a segmentation fault. Now, adding "--retry" no
longer causes curl to crash. (BZ#1009455)

  • The "curl --trace-time" command did not use the correct local time when

printing timestamps. Now, "curl --trace-time" works as expected.
(BZ#1120196)

  • The valgrind utility could report dynamically allocated memory leaks on

curl exit. Now, curl performs a global shutdown of the NetScape Portable
Runtime (NSPR) library on exit, and valgrind no longer reports the memory
leaks. (BZ#1146528)

  • Previously, libcurl returned an incorrect value of the

CURLINFO_HEADER_SIZE field when a proxy server appended its own headers to
the HTTP response. Now, the returned value is valid. (BZ#1161163)

Enhancements:

  • The "--tlsv1.0", "--tlsv1.1", and "--tlsv1.2" options are available for

specifying the minor version of the TLS protocol to be negotiated by NSS.
The "--tlsv1" option now negotiates the highest version of the TLS protocol
supported by both the client and the server. (BZ#1012136)

  • It is now possible to explicitly enable or disable the ECC and the new

AES cipher suites to be used for TLS. (BZ#1058767, BZ#1156422)

All curl users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add these
enhancements.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x

Fixes

  • BZ - 835898 - Bug in DNS cache causes connections until restart of libcurl-using processes
  • BZ - 883002 - curl used with file:// protocol opens and closes a destination file twice
  • BZ - 997185 - sendrecv.c example incorrect type for sockfd
  • BZ - 1008178 - curl scp download fails in fips mode
  • BZ - 1011083 - CA certificate cannot be specified by nickname [documentation bug]
  • BZ - 1011101 - manpage typos found using aspell
  • BZ - 1058767 - curl does not support ECDSA certificates
  • BZ - 1104160 - Link in curl man page is wrong
  • BZ - 1136154 - CVE-2014-3613 curl: incorrect handling of IP addresses in cookie domain
  • BZ - 1154059 - curl: Disable out-of-protocol fallback to SSL 3.0
  • BZ - 1154747 - NTLM: ignore CURLOPT_FORBID_REUSE during NTLM HTTP auth
  • BZ - 1154941 - CVE-2014-3707 curl: incorrect handle duplication after COPYPOSTFIELDS
  • BZ - 1156422 - curl does not allow explicit control of DHE ciphers
  • BZ - 1161163 - Response headers added by proxy servers missing in CURLINFO_HEADER_SIZE
  • BZ - 1168137 - curl closes connection after HEAD request fails
  • BZ - 1178692 - CVE-2014-8150 curl: URL request injection vulnerability in parseurlandfillconn()
  • BZ - 1213306 - CVE-2015-3143 curl: re-using authenticated connection when unauthenticated
  • BZ - 1213351 - CVE-2015-3148 curl: Negotiate not treated as connection-oriented

CVEs

  • CVE-2015-3143
  • CVE-2014-3707
  • CVE-2014-3613
  • CVE-2014-8150
  • CVE-2015-3148

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
x86_64
curl-7.19.7-46.el6.x86_64.rpm SHA-256: f2928f7d55217c46054a6fd9b646bd365be5a40251e82954054d6d8835f92ab5
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-7.19.7-46.el6.x86_64.rpm SHA-256: fc38b17223fe18150300cf03eb6488cdab772bb7f72d32fe3ef867eb7151fdbd
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1
libcurl-devel-7.19.7-46.el6.x86_64.rpm SHA-256: b12d689fbcaf7986d0b15ad7ec131ef873c0661668336b5474e70711d251e678
i386
curl-7.19.7-46.el6.i686.rpm SHA-256: 6ff132181d0c5f8664d4c29c5a4bdc3eec2837d44a14233e1374e2cf1f0071c6
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
x86_64
curl-7.19.7-46.el6.x86_64.rpm SHA-256: f2928f7d55217c46054a6fd9b646bd365be5a40251e82954054d6d8835f92ab5
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-7.19.7-46.el6.x86_64.rpm SHA-256: fc38b17223fe18150300cf03eb6488cdab772bb7f72d32fe3ef867eb7151fdbd
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1
libcurl-devel-7.19.7-46.el6.x86_64.rpm SHA-256: b12d689fbcaf7986d0b15ad7ec131ef873c0661668336b5474e70711d251e678
i386
curl-7.19.7-46.el6.i686.rpm SHA-256: 6ff132181d0c5f8664d4c29c5a4bdc3eec2837d44a14233e1374e2cf1f0071c6
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1

Red Hat Enterprise Linux Workstation 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
x86_64
curl-7.19.7-46.el6.x86_64.rpm SHA-256: f2928f7d55217c46054a6fd9b646bd365be5a40251e82954054d6d8835f92ab5
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-7.19.7-46.el6.x86_64.rpm SHA-256: fc38b17223fe18150300cf03eb6488cdab772bb7f72d32fe3ef867eb7151fdbd
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1
libcurl-devel-7.19.7-46.el6.x86_64.rpm SHA-256: b12d689fbcaf7986d0b15ad7ec131ef873c0661668336b5474e70711d251e678
i386
curl-7.19.7-46.el6.i686.rpm SHA-256: 6ff132181d0c5f8664d4c29c5a4bdc3eec2837d44a14233e1374e2cf1f0071c6
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1

Red Hat Enterprise Linux Desktop 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
x86_64
curl-7.19.7-46.el6.x86_64.rpm SHA-256: f2928f7d55217c46054a6fd9b646bd365be5a40251e82954054d6d8835f92ab5
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-7.19.7-46.el6.x86_64.rpm SHA-256: fc38b17223fe18150300cf03eb6488cdab772bb7f72d32fe3ef867eb7151fdbd
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1
libcurl-devel-7.19.7-46.el6.x86_64.rpm SHA-256: b12d689fbcaf7986d0b15ad7ec131ef873c0661668336b5474e70711d251e678
i386
curl-7.19.7-46.el6.i686.rpm SHA-256: 6ff132181d0c5f8664d4c29c5a4bdc3eec2837d44a14233e1374e2cf1f0071c6
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
s390x
curl-7.19.7-46.el6.s390x.rpm SHA-256: abd7e04761dbc24e979257436b6af036a8a203f0b8075564d5cdd4e48183c128
curl-debuginfo-7.19.7-46.el6.s390.rpm SHA-256: a80b47d9c3a06ebde6b03d90bbf3d84e8c1da52e8adfe2a605712151b6097d3f
curl-debuginfo-7.19.7-46.el6.s390x.rpm SHA-256: e5dcf87f8be67d6241cf5276d91ab103edad46dfbddd28055bf285e13931fe5a
libcurl-7.19.7-46.el6.s390.rpm SHA-256: 36b7288f67f87cd5907c00d35ea260db59d6fe0d1729b2293c637e8e6ec87acd
libcurl-7.19.7-46.el6.s390x.rpm SHA-256: bd24d38fa2d6275c993ee8ae24da4565672fd57411bbcc5724418df514aab63b
libcurl-devel-7.19.7-46.el6.s390.rpm SHA-256: 9eb5b5597eac82af9253e698f150919ac07604f743569465e31c47ddb944256b
libcurl-devel-7.19.7-46.el6.s390x.rpm SHA-256: 912ae809f017df575cd9fb3643bcee59927e52262e5a7c2b9a4f13acf67f5ef0

Red Hat Enterprise Linux for Power, big endian 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
ppc64
curl-7.19.7-46.el6.ppc64.rpm SHA-256: 8a3b6b243e3aa34788060061f7f98bd86c0956b2252c36c173ed6e6157e8a7ef
curl-debuginfo-7.19.7-46.el6.ppc.rpm SHA-256: 319540bada642daab931d46113be6921b03b59206027a75163e0d9c1dbd59ebf
curl-debuginfo-7.19.7-46.el6.ppc64.rpm SHA-256: 71666f2ccd3b4f5d8ccbd7b60f82392314d4b7097df28509751037126e411741
libcurl-7.19.7-46.el6.ppc.rpm SHA-256: 386d7d4b65409286fe0bbb70f48e7f58b5cde7f7b80a22b8ad2120045b4c3376
libcurl-7.19.7-46.el6.ppc64.rpm SHA-256: 4b06553cfb537a7a460be60e97b94aefaa8d361c8d94f09c0910d75129af6783
libcurl-devel-7.19.7-46.el6.ppc.rpm SHA-256: 758f2ba96e7d452cb76d178cd6c2fd46d614371a1a24ed695a5f3e7ae94d0c4e
libcurl-devel-7.19.7-46.el6.ppc64.rpm SHA-256: 1942ad8f4828b8b29fb32dc60f8e4516ff4b1b3b27b38c16ee3fcae318a72854

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
x86_64
curl-7.19.7-46.el6.x86_64.rpm SHA-256: f2928f7d55217c46054a6fd9b646bd365be5a40251e82954054d6d8835f92ab5
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-7.19.7-46.el6.x86_64.rpm SHA-256: fc38b17223fe18150300cf03eb6488cdab772bb7f72d32fe3ef867eb7151fdbd
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1
libcurl-devel-7.19.7-46.el6.x86_64.rpm SHA-256: b12d689fbcaf7986d0b15ad7ec131ef873c0661668336b5474e70711d251e678

Red Hat Enterprise Linux Server from RHUI 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
x86_64
curl-7.19.7-46.el6.x86_64.rpm SHA-256: f2928f7d55217c46054a6fd9b646bd365be5a40251e82954054d6d8835f92ab5
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
curl-debuginfo-7.19.7-46.el6.x86_64.rpm SHA-256: 2edc8647ed2d686633c60a24da015e44a0b58d62c045c23dbe321176d53dd11c
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-7.19.7-46.el6.x86_64.rpm SHA-256: fc38b17223fe18150300cf03eb6488cdab772bb7f72d32fe3ef867eb7151fdbd
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1
libcurl-devel-7.19.7-46.el6.x86_64.rpm SHA-256: b12d689fbcaf7986d0b15ad7ec131ef873c0661668336b5474e70711d251e678
i386
curl-7.19.7-46.el6.i686.rpm SHA-256: 6ff132181d0c5f8664d4c29c5a4bdc3eec2837d44a14233e1374e2cf1f0071c6
curl-debuginfo-7.19.7-46.el6.i686.rpm SHA-256: e3989b68edd43c103cf1e6c3e772dfa90b973ac10df7b5ac2cc0f3533f9c6da0
libcurl-7.19.7-46.el6.i686.rpm SHA-256: 725af1d3dbbbc106353d7c7f0de847e6703efeb12ecae9d1a1e037bee23bfe97
libcurl-devel-7.19.7-46.el6.i686.rpm SHA-256: bac1f1da5e5a3959a5ad0c8b23326c807af5f2ed00b98c7b35ce6be74eb398b1

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
curl-7.19.7-46.el6.src.rpm SHA-256: d75c79c63047307b9dbacfd214503dd2dac7d934c8f4340bc7e295f37b9aa31f
s390x
curl-7.19.7-46.el6.s390x.rpm SHA-256: abd7e04761dbc24e979257436b6af036a8a203f0b8075564d5cdd4e48183c128
curl-debuginfo-7.19.7-46.el6.s390.rpm SHA-256: a80b47d9c3a06ebde6b03d90bbf3d84e8c1da52e8adfe2a605712151b6097d3f
curl-debuginfo-7.19.7-46.el6.s390x.rpm SHA-256: e5dcf87f8be67d6241cf5276d91ab103edad46dfbddd28055bf285e13931fe5a
libcurl-7.19.7-46.el6.s390.rpm SHA-256: 36b7288f67f87cd5907c00d35ea260db59d6fe0d1729b2293c637e8e6ec87acd
libcurl-7.19.7-46.el6.s390x.rpm SHA-256: bd24d38fa2d6275c993ee8ae24da4565672fd57411bbcc5724418df514aab63b
libcurl-devel-7.19.7-46.el6.s390.rpm SHA-256: 9eb5b5597eac82af9253e698f150919ac07604f743569465e31c47ddb944256b
libcurl-devel-7.19.7-46.el6.s390x.rpm SHA-256: 912ae809f017df575cd9fb3643bcee59927e52262e5a7c2b9a4f13acf67f5ef0

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter