Skip to navigation

Security Advisory Moderate: curl security update

Advisory: RHSA-2009:1209-1
Type: Security Advisory
Severity: Moderate
Issued on: 2009-08-13
Last updated on: 2009-08-13
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.8.z)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.8.z)
Red Hat Enterprise Linux EUS (v. 5.3.z server)
Red Hat Enterprise Linux Long Life (v. 5.3 server)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2009-2417

Details

Updated curl packages that fix security issues are now available for Red
Hat Enterprise Linux 3, 4, and 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

cURL is a tool for getting files from FTP, HTTP, Gopher, Telnet, and Dict
servers, using any of the supported protocols. cURL is designed to work
without user interaction or any kind of interactivity.

Scott Cantor reported that cURL is affected by the previously published
"null prefix attack", caused by incorrect handling of NULL characters in
X.509 certificates. If an attacker is able to get a carefully-crafted
certificate signed by a trusted Certificate Authority, the attacker could
use the certificate during a man-in-the-middle attack and potentially
confuse cURL into accepting it by mistake. (CVE-2009-2417)

cURL users should upgrade to these updated packages, which contain a
backported patch to correct these issues. All running applications using
libcurl must be restarted for the update to take effect.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
curl-7.15.5-2.1.el5_3.5.src.rpm
File outdated by:  RHSA-2013:0983
    MD5: 874345e7dc77bd08f4b0c38266e5522b
 
IA-32:
curl-devel-7.15.5-2.1.el5_3.5.i386.rpm
File outdated by:  RHSA-2013:0983
    MD5: 38fabd545fe592ecdc70b038dcb67453
 
x86_64:
curl-devel-7.15.5-2.1.el5_3.5.i386.rpm
File outdated by:  RHSA-2013:0983
    MD5: 38fabd545fe592ecdc70b038dcb67453
curl-devel-7.15.5-2.1.el5_3.5.x86_64.rpm
File outdated by:  RHSA-2013:0983
    MD5: 6d618ddbff3cc89ecea2e75317fd2be2
 
Red Hat Desktop (v. 3)

IA-32:
curl-7.10.6-10.rhel3.i386.rpm
File outdated by:  RHSA-2010:0329
    MD5: e4d15b319730a13cd676ca6fa87c3d1b
curl-devel-7.10.6-10.rhel3.i386.rpm
File outdated by:  RHSA-2010:0329
    MD5: c214f28d976a35dc046ec905a9632e2e
 
x86_64:
curl-7.10.6-10.rhel3.i386.rpm
File outdated by:  RHSA-2010:0329
    MD5: e4d15b319730a13cd676ca6fa87c3d1b
curl-7.10.6-10.rhel3.x86_64.rpm
File outdated by:  RHSA-2010:0329
    MD5: 495eb2a2d40cffe0389ff0f42fce793f
curl-devel-7.10.6-10.rhel3.x86_64.rpm
File outdated by:  RHSA-2010:0329
    MD5: 3084e0f6166c6418d1af0821805bbe78
 
Red Hat Desktop (v. 4)

SRPMS:
curl-7.12.1-11.1.el4_8.1.src.rpm
File outdated by:  RHSA-2011:0918
    MD5: 88a1050b217f9fa98589846f6727d7c3
 
IA-32:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-devel-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: b939908e715b1aeb63f09a4cb3b69ad4
 
x86_64:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-7.12.1-11.1.el4_8.1.x86_64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 17e3b42787453a0a7843e913295971d4
curl-devel-7.12.1-11.1.el4_8.1.x86_64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 26bbe411343d7de9c766205e057e2f90
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
curl-7.15.5-2.1.el5_3.5.src.rpm
File outdated by:  RHSA-2013:0983
    MD5: 874345e7dc77bd08f4b0c38266e5522b
 
IA-32:
curl-7.15.5-2.1.el5_3.5.i386.rpm
File outdated by:  RHSA-2013:0983
    MD5: 674f5e07a23925b3ebaf0381287b6cb3
curl-devel-7.15.5-2.1.el5_3.5.i386.rpm
File outdated by:  RHSA-2013:0983
    MD5: 38fabd545fe592ecdc70b038dcb67453
 
IA-64:
curl-7.15.5-2.1.el5_3.5.ia64.rpm
File outdated by:  RHSA-2013:0983
    MD5: 901513594243236b0912b48407f9c000
curl-devel-7.15.5-2.1.el5_3.5.ia64.rpm
File outdated by:  RHSA-2013:0983
    MD5: 2f0ca48131114288230615018773d489
 
PPC:
curl-7.15.5-2.1.el5_3.5.ppc.rpm
File outdated by:  RHSA-2013:0983
    MD5: a647cc8fd38ca0c4e70470e55d7e4b3c
curl-7.15.5-2.1.el5_3.5.ppc64.rpm
File outdated by:  RHSA-2013:0983
    MD5: d6046f43e794520584ba8bf338cddf95
curl-devel-7.15.5-2.1.el5_3.5.ppc.rpm
File outdated by:  RHSA-2013:0983
    MD5: aa737b720227be2796396c25653d3103
curl-devel-7.15.5-2.1.el5_3.5.ppc64.rpm
File outdated by:  RHSA-2013:0983
    MD5: 687f179d822c424f6141da051d72dfde
 
s390x:
curl-7.15.5-2.1.el5_3.5.s390.rpm
File outdated by:  RHSA-2013:0983
    MD5: 1cf3ed10a5200702b56fb6d0617a33ab
curl-7.15.5-2.1.el5_3.5.s390x.rpm
File outdated by:  RHSA-2013:0983
    MD5: 8c6c90b5e007915cdde175bc6c0aed7d
curl-devel-7.15.5-2.1.el5_3.5.s390.rpm
File outdated by:  RHSA-2013:0983
    MD5: 31434482cac0dc2412c1b3788a1377d7
curl-devel-7.15.5-2.1.el5_3.5.s390x.rpm
File outdated by:  RHSA-2013:0983
    MD5: 2d37b887f6f7071127044dd0a8d999fb
 
x86_64:
curl-7.15.5-2.1.el5_3.5.i386.rpm
File outdated by:  RHSA-2013:0983
    MD5: 674f5e07a23925b3ebaf0381287b6cb3
curl-7.15.5-2.1.el5_3.5.x86_64.rpm
File outdated by:  RHSA-2013:0983
    MD5: 8446834956666e86e7810a2fde848c8a
curl-devel-7.15.5-2.1.el5_3.5.i386.rpm
File outdated by:  RHSA-2013:0983
    MD5: 38fabd545fe592ecdc70b038dcb67453
curl-devel-7.15.5-2.1.el5_3.5.x86_64.rpm
File outdated by:  RHSA-2013:0983
    MD5: 6d618ddbff3cc89ecea2e75317fd2be2
 
Red Hat Enterprise Linux AS (v. 3)

IA-32:
curl-7.10.6-10.rhel3.i386.rpm
File outdated by:  RHSA-2010:0329
    MD5: e4d15b319730a13cd676ca6fa87c3d1b
curl-devel-7.10.6-10.rhel3.i386.rpm
File outdated by:  RHSA-2010:0329
    MD5: c214f28d976a35dc046ec905a9632e2e
 
IA-64:
curl-7.10.6-10.rhel3.i386.rpm
File outdated by:  RHSA-2010:0329
    MD5: e4d15b319730a13cd676ca6fa87c3d1b
curl-7.10.6-10.rhel3.ia64.rpm
File outdated by:  RHSA-2010:0329
    MD5: 4a4f0de955932d6f2d8a36bea67f9564
curl-devel-7.10.6-10.rhel3.ia64.rpm
File outdated by:  RHSA-2010:0329
    MD5: 103378e6d112bce4ea9cc7547e88099a
 
PPC:
curl-7.10.6-10.rhel3.ppc.rpm
File outdated by:  RHSA-2010:0329
    MD5: 2d9a2a62a622b77450cf2c911175b073
curl-7.10.6-10.rhel3.ppc64.rpm
File outdated by:  RHSA-2010:0329
    MD5: b63da08c67a05cb9c47aa0868984148b
curl-devel-7.10.6-10.rhel3.ppc.rpm
File outdated by:  RHSA-2010:0329
    MD5: f0dcbbe90a131a55ed398a7bbab8d95c
 
s390:
curl-7.10.6-10.rhel3.s390.rpm
File outdated by:  RHSA-2010:0329
    MD5: 36ef42068aa9dbd6868633e647ac72cc
curl-devel-7.10.6-10.rhel3.s390.rpm
File outdated by:  RHSA-2010:0329
    MD5: 139aa98016e849d3c3068c88cabaea54
 
s390x:
curl-7.10.6-10.rhel3.s390.rpm
File outdated by:  RHSA-2010:0329
    MD5: 36ef42068aa9dbd6868633e647ac72cc
curl-7.10.6-10.rhel3.s390x.rpm
File outdated by:  RHSA-2010:0329
    MD5: 6760aa667174386680eef6d5e985aca3
curl-devel-7.10.6-10.rhel3.s390x.rpm
File outdated by:  RHSA-2010:0329
    MD5: 937b27f7ef464012ecf325edb88ccd38
 
x86_64:
curl-7.10.6-10.rhel3.i386.rpm
File outdated by:  RHSA-2010:0329
    MD5: e4d15b319730a13cd676ca6fa87c3d1b
curl-7.10.6-10.rhel3.x86_64.rpm
File outdated by:  RHSA-2010:0329
    MD5: 495eb2a2d40cffe0389ff0f42fce793f
curl-devel-7.10.6-10.rhel3.x86_64.rpm
File outdated by:  RHSA-2010:0329
    MD5: 3084e0f6166c6418d1af0821805bbe78
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
curl-7.12.1-11.1.el4_8.1.src.rpm
File outdated by:  RHSA-2011:0918
    MD5: 88a1050b217f9fa98589846f6727d7c3
 
IA-32:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-devel-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: b939908e715b1aeb63f09a4cb3b69ad4
 
IA-64:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-7.12.1-11.1.el4_8.1.ia64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 2fde9f8f32475db718c5ad99ec8e09ef
curl-devel-7.12.1-11.1.el4_8.1.ia64.rpm
File outdated by:  RHSA-2011:0918
    MD5: cb1ef87b13811b3c206a3d20a5f3cc75
 
PPC:
curl-7.12.1-11.1.el4_8.1.ppc.rpm
File outdated by:  RHSA-2011:0918
    MD5: 5c25fc52e064d8e8b142acb10245073f
curl-7.12.1-11.1.el4_8.1.ppc64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 88dcf54cf0979de902b851a08f3577e3
curl-devel-7.12.1-11.1.el4_8.1.ppc.rpm
File outdated by:  RHSA-2011:0918
    MD5: 175d568ac83098e0fddb89a8a98d578e
 
s390:
curl-7.12.1-11.1.el4_8.1.s390.rpm
File outdated by:  RHSA-2011:0918
    MD5: a27307843b8de97f8eb5a1feed0596c6
curl-devel-7.12.1-11.1.el4_8.1.s390.rpm
File outdated by:  RHSA-2011:0918
    MD5: dcaa31cb174f06a4f458b5f5520e406a
 
s390x:
curl-7.12.1-11.1.el4_8.1.s390.rpm
File outdated by:  RHSA-2011:0918
    MD5: a27307843b8de97f8eb5a1feed0596c6
curl-7.12.1-11.1.el4_8.1.s390x.rpm
File outdated by:  RHSA-2011:0918
    MD5: 6a83b2d991592e9e5d30c38a13ce7304
curl-devel-7.12.1-11.1.el4_8.1.s390x.rpm
File outdated by:  RHSA-2011:0918
    MD5: e2c478a58ca41f2369c2831440a10862
 
x86_64:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-7.12.1-11.1.el4_8.1.x86_64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 17e3b42787453a0a7843e913295971d4
curl-devel-7.12.1-11.1.el4_8.1.x86_64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 26bbe411343d7de9c766205e057e2f90
 
Red Hat Enterprise Linux AS (v. 4.8.z)

SRPMS:
curl-7.12.1-11.1.el4_8.1.src.rpm
File outdated by:  RHSA-2011:0918
    MD5: 88a1050b217f9fa98589846f6727d7c3
 
IA-32:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-devel-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: b939908e715b1aeb63f09a4cb3b69ad4
 
IA-64:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-7.12.1-11.1.el4_8.1.ia64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 2fde9f8f32475db718c5ad99ec8e09ef
curl-devel-7.12.1-11.1.el4_8.1.ia64.rpm
File outdated by:  RHSA-2011:0918
    MD5: cb1ef87b13811b3c206a3d20a5f3cc75
 
PPC:
curl-7.12.1-11.1.el4_8.1.ppc.rpm
File outdated by:  RHSA-2011:0918
    MD5: 5c25fc52e064d8e8b142acb10245073f
curl-7.12.1-11.1.el4_8.1.ppc64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 88dcf54cf0979de902b851a08f3577e3
curl-devel-7.12.1-11.1.el4_8.1.ppc.rpm
File outdated by:  RHSA-2011:0918
    MD5: 175d568ac83098e0fddb89a8a98d578e
 
s390:
curl-7.12.1-11.1.el4_8.1.s390.rpm
File outdated by:  RHSA-2011:0918
    MD5: a27307843b8de97f8eb5a1feed0596c6
curl-devel-7.12.1-11.1.el4_8.1.s390.rpm
File outdated by:  RHSA-2011:0918
    MD5: dcaa31cb174f06a4f458b5f5520e406a
 
s390x:
curl-7.12.1-11.1.el4_8.1.s390.rpm
File outdated by:  RHSA-2011:0918
    MD5: a27307843b8de97f8eb5a1feed0596c6
curl-7.12.1-11.1.el4_8.1.s390x.rpm
File outdated by:  RHSA-2011:0918
    MD5: 6a83b2d991592e9e5d30c38a13ce7304
curl-devel-7.12.1-11.1.el4_8.1.s390x.rpm
File outdated by:  RHSA-2011:0918
    MD5: e2c478a58ca41f2369c2831440a10862
 
x86_64:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-7.12.1-11.1.el4_8.1.x86_64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 17e3b42787453a0a7843e913295971d4
curl-devel-7.12.1-11.1.el4_8.1.x86_64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 26bbe411343d7de9c766205e057e2f90
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
curl-7.15.5-2.1.el5_3.5.src.rpm
File outdated by:  RHSA-2013:0983
    MD5: 874345e7dc77bd08f4b0c38266e5522b
 
IA-32:
curl-7.15.5-2.1.el5_3.5.i386.rpm
File outdated by:  RHSA-2013:0983
    MD5: 674f5e07a23925b3ebaf0381287b6cb3
 
x86_64:
curl-7.15.5-2.1.el5_3.5.i386.rpm
File outdated by:  RHSA-2013:0983
    MD5: 674f5e07a23925b3ebaf0381287b6cb3
curl-7.15.5-2.1.el5_3.5.x86_64.rpm
File outdated by:  RHSA-2013:0983
    MD5: 8446834956666e86e7810a2fde848c8a
 
Red Hat Enterprise Linux ES (v. 3)

IA-32:
curl-7.10.6-10.rhel3.i386.rpm
File outdated by:  RHSA-2010:0329
    MD5: e4d15b319730a13cd676ca6fa87c3d1b
curl-devel-7.10.6-10.rhel3.i386.rpm
File outdated by:  RHSA-2010:0329
    MD5: c214f28d976a35dc046ec905a9632e2e
 
IA-64:
curl-7.10.6-10.rhel3.i386.rpm
File outdated by:  RHSA-2010:0329
    MD5: e4d15b319730a13cd676ca6fa87c3d1b
curl-7.10.6-10.rhel3.ia64.rpm
File outdated by:  RHSA-2010:0329
    MD5: 4a4f0de955932d6f2d8a36bea67f9564
curl-devel-7.10.6-10.rhel3.ia64.rpm
File outdated by:  RHSA-2010:0329
    MD5: 103378e6d112bce4ea9cc7547e88099a
 
x86_64:
curl-7.10.6-10.rhel3.i386.rpm
File outdated by:  RHSA-2010:0329
    MD5: e4d15b319730a13cd676ca6fa87c3d1b
curl-7.10.6-10.rhel3.x86_64.rpm
File outdated by:  RHSA-2010:0329
    MD5: 495eb2a2d40cffe0389ff0f42fce793f
curl-devel-7.10.6-10.rhel3.x86_64.rpm
File outdated by:  RHSA-2010:0329
    MD5: 3084e0f6166c6418d1af0821805bbe78
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
curl-7.12.1-11.1.el4_8.1.src.rpm
File outdated by:  RHSA-2011:0918
    MD5: 88a1050b217f9fa98589846f6727d7c3
 
IA-32:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-devel-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: b939908e715b1aeb63f09a4cb3b69ad4
 
IA-64:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-7.12.1-11.1.el4_8.1.ia64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 2fde9f8f32475db718c5ad99ec8e09ef
curl-devel-7.12.1-11.1.el4_8.1.ia64.rpm
File outdated by:  RHSA-2011:0918
    MD5: cb1ef87b13811b3c206a3d20a5f3cc75
 
x86_64:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-7.12.1-11.1.el4_8.1.x86_64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 17e3b42787453a0a7843e913295971d4
curl-devel-7.12.1-11.1.el4_8.1.x86_64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 26bbe411343d7de9c766205e057e2f90
 
Red Hat Enterprise Linux ES (v. 4.8.z)

SRPMS:
curl-7.12.1-11.1.el4_8.1.src.rpm
File outdated by:  RHSA-2011:0918
    MD5: 88a1050b217f9fa98589846f6727d7c3
 
IA-32:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-devel-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: b939908e715b1aeb63f09a4cb3b69ad4
 
IA-64:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-7.12.1-11.1.el4_8.1.ia64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 2fde9f8f32475db718c5ad99ec8e09ef
curl-devel-7.12.1-11.1.el4_8.1.ia64.rpm
File outdated by:  RHSA-2011:0918
    MD5: cb1ef87b13811b3c206a3d20a5f3cc75
 
x86_64:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-7.12.1-11.1.el4_8.1.x86_64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 17e3b42787453a0a7843e913295971d4
curl-devel-7.12.1-11.1.el4_8.1.x86_64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 26bbe411343d7de9c766205e057e2f90
 
Red Hat Enterprise Linux EUS (v. 5.3.z server)

SRPMS:
curl-7.15.5-2.1.el5_3.5.src.rpm
File outdated by:  RHSA-2013:0983
    MD5: 874345e7dc77bd08f4b0c38266e5522b
 
IA-32:
curl-7.15.5-2.1.el5_3.5.i386.rpm     MD5: 674f5e07a23925b3ebaf0381287b6cb3
curl-devel-7.15.5-2.1.el5_3.5.i386.rpm     MD5: 38fabd545fe592ecdc70b038dcb67453
 
IA-64:
curl-7.15.5-2.1.el5_3.5.ia64.rpm     MD5: 901513594243236b0912b48407f9c000
curl-devel-7.15.5-2.1.el5_3.5.ia64.rpm     MD5: 2f0ca48131114288230615018773d489
 
PPC:
curl-7.15.5-2.1.el5_3.5.ppc.rpm     MD5: a647cc8fd38ca0c4e70470e55d7e4b3c
curl-7.15.5-2.1.el5_3.5.ppc64.rpm     MD5: d6046f43e794520584ba8bf338cddf95
curl-devel-7.15.5-2.1.el5_3.5.ppc.rpm     MD5: aa737b720227be2796396c25653d3103
curl-devel-7.15.5-2.1.el5_3.5.ppc64.rpm     MD5: 687f179d822c424f6141da051d72dfde
 
s390x:
curl-7.15.5-2.1.el5_3.5.s390.rpm     MD5: 1cf3ed10a5200702b56fb6d0617a33ab
curl-7.15.5-2.1.el5_3.5.s390x.rpm     MD5: 8c6c90b5e007915cdde175bc6c0aed7d
curl-devel-7.15.5-2.1.el5_3.5.s390.rpm     MD5: 31434482cac0dc2412c1b3788a1377d7
curl-devel-7.15.5-2.1.el5_3.5.s390x.rpm     MD5: 2d37b887f6f7071127044dd0a8d999fb
 
x86_64:
curl-7.15.5-2.1.el5_3.5.i386.rpm     MD5: 674f5e07a23925b3ebaf0381287b6cb3
curl-7.15.5-2.1.el5_3.5.x86_64.rpm     MD5: 8446834956666e86e7810a2fde848c8a
curl-devel-7.15.5-2.1.el5_3.5.i386.rpm     MD5: 38fabd545fe592ecdc70b038dcb67453
curl-devel-7.15.5-2.1.el5_3.5.x86_64.rpm     MD5: 6d618ddbff3cc89ecea2e75317fd2be2
 
Red Hat Enterprise Linux Long Life (v. 5.3 server)

SRPMS:
curl-7.15.5-2.1.el5_3.5.src.rpm
File outdated by:  RHSA-2013:0983
    MD5: 874345e7dc77bd08f4b0c38266e5522b
 
IA-32:
curl-7.15.5-2.1.el5_3.5.i386.rpm     MD5: 674f5e07a23925b3ebaf0381287b6cb3
curl-devel-7.15.5-2.1.el5_3.5.i386.rpm     MD5: 38fabd545fe592ecdc70b038dcb67453
 
IA-64:
curl-7.15.5-2.1.el5_3.5.ia64.rpm     MD5: 901513594243236b0912b48407f9c000
curl-devel-7.15.5-2.1.el5_3.5.ia64.rpm     MD5: 2f0ca48131114288230615018773d489
 
x86_64:
curl-7.15.5-2.1.el5_3.5.i386.rpm     MD5: 674f5e07a23925b3ebaf0381287b6cb3
curl-7.15.5-2.1.el5_3.5.x86_64.rpm     MD5: 8446834956666e86e7810a2fde848c8a
curl-devel-7.15.5-2.1.el5_3.5.i386.rpm     MD5: 38fabd545fe592ecdc70b038dcb67453
curl-devel-7.15.5-2.1.el5_3.5.x86_64.rpm     MD5: 6d618ddbff3cc89ecea2e75317fd2be2
 
Red Hat Enterprise Linux WS (v. 3)

IA-32:
curl-7.10.6-10.rhel3.i386.rpm
File outdated by:  RHSA-2010:0329
    MD5: e4d15b319730a13cd676ca6fa87c3d1b
curl-devel-7.10.6-10.rhel3.i386.rpm
File outdated by:  RHSA-2010:0329
    MD5: c214f28d976a35dc046ec905a9632e2e
 
IA-64:
curl-7.10.6-10.rhel3.i386.rpm
File outdated by:  RHSA-2010:0329
    MD5: e4d15b319730a13cd676ca6fa87c3d1b
curl-7.10.6-10.rhel3.ia64.rpm
File outdated by:  RHSA-2010:0329
    MD5: 4a4f0de955932d6f2d8a36bea67f9564
curl-devel-7.10.6-10.rhel3.ia64.rpm
File outdated by:  RHSA-2010:0329
    MD5: 103378e6d112bce4ea9cc7547e88099a
 
x86_64:
curl-7.10.6-10.rhel3.i386.rpm
File outdated by:  RHSA-2010:0329
    MD5: e4d15b319730a13cd676ca6fa87c3d1b
curl-7.10.6-10.rhel3.x86_64.rpm
File outdated by:  RHSA-2010:0329
    MD5: 495eb2a2d40cffe0389ff0f42fce793f
curl-devel-7.10.6-10.rhel3.x86_64.rpm
File outdated by:  RHSA-2010:0329
    MD5: 3084e0f6166c6418d1af0821805bbe78
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
curl-7.12.1-11.1.el4_8.1.src.rpm
File outdated by:  RHSA-2011:0918
    MD5: 88a1050b217f9fa98589846f6727d7c3
 
IA-32:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-devel-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: b939908e715b1aeb63f09a4cb3b69ad4
 
IA-64:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-7.12.1-11.1.el4_8.1.ia64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 2fde9f8f32475db718c5ad99ec8e09ef
curl-devel-7.12.1-11.1.el4_8.1.ia64.rpm
File outdated by:  RHSA-2011:0918
    MD5: cb1ef87b13811b3c206a3d20a5f3cc75
 
x86_64:
curl-7.12.1-11.1.el4_8.1.i386.rpm
File outdated by:  RHSA-2011:0918
    MD5: 822bbd0fd827b0049655f02418649170
curl-7.12.1-11.1.el4_8.1.x86_64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 17e3b42787453a0a7843e913295971d4
curl-devel-7.12.1-11.1.el4_8.1.x86_64.rpm
File outdated by:  RHSA-2011:0918
    MD5: 26bbe411343d7de9c766205e057e2f90
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

516181 - CVE-2009-2417 curl: incorrect verification of SSL certificate with NUL in name


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/