First published: Tue Jul 18 2023(Updated: )
Moderate: curl security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/curl | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/curl | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/curl-debuginfo | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/curl-debuginfo | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/curl-debugsource | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/curl-debugsource | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/curl-minimal | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/curl-minimal-debuginfo | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/curl-minimal-debuginfo | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/libcurl | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/libcurl | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/libcurl-debuginfo | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/libcurl-debuginfo | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/libcurl-devel | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/libcurl-devel | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/libcurl-minimal | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/libcurl-minimal | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/libcurl-minimal-debuginfo | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/libcurl-minimal-debuginfo | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/curl-minimal | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/curl | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/curl-debuginfo | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/curl-debugsource | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/curl-minimal | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/curl-minimal-debuginfo | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/libcurl | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/libcurl-debuginfo | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/libcurl-devel | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/libcurl-minimal | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/libcurl-minimal-debuginfo | <7.76.1-14.el9_0.6 | 7.76.1-14.el9_0.6 |
redhat/curl | <7.76.1-14.el9_0.6.aa | 7.76.1-14.el9_0.6.aa |
redhat/curl-debuginfo | <7.76.1-14.el9_0.6.aa | 7.76.1-14.el9_0.6.aa |
redhat/curl-debugsource | <7.76.1-14.el9_0.6.aa | 7.76.1-14.el9_0.6.aa |
redhat/curl-minimal | <7.76.1-14.el9_0.6.aa | 7.76.1-14.el9_0.6.aa |
redhat/curl-minimal-debuginfo | <7.76.1-14.el9_0.6.aa | 7.76.1-14.el9_0.6.aa |
redhat/libcurl | <7.76.1-14.el9_0.6.aa | 7.76.1-14.el9_0.6.aa |
redhat/libcurl-debuginfo | <7.76.1-14.el9_0.6.aa | 7.76.1-14.el9_0.6.aa |
redhat/libcurl-devel | <7.76.1-14.el9_0.6.aa | 7.76.1-14.el9_0.6.aa |
redhat/libcurl-minimal | <7.76.1-14.el9_0.6.aa | 7.76.1-14.el9_0.6.aa |
redhat/libcurl-minimal-debuginfo | <7.76.1-14.el9_0.6.aa | 7.76.1-14.el9_0.6.aa |
Red Hat Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux Server | ||
Red Hat Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux for ARM64 EUS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2023:4139 is classified as a moderate security vulnerability.
To address RHSA-2023:4139, update the curl package to version 7.76.1-14.el9_0.6 or later.
RHSA-2023:4139 addresses vulnerabilities related to POST following PUT confusion as identified by CVE-2022-32221.
RHSA-2023:4139 affects multiple versions of Red Hat Enterprise Linux including those for x86_64, Power, and IBM z Systems.
The RHSA-2023:4139 update includes curl, libcurl, and their respective debuginfo and minimal packages.