ELSA-2021-4059

ELSA-2021-4059 - curl security update

Type:SECURITY
Impact:MODERATE
Release Date:2021-11-02

Description


[7.61.1-18.el8_4.2]
- fix STARTTLS protocol injection via MITM (CVE-2021-22947)
- fix protocol downgrade required TLS bypass (CVE-2021-22946)


Related CVEs


CVE-2021-22947
CVE-2021-22946

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 8 (aarch64) curl-7.61.1-18.el8_4.2.src.rpme0c754d8f5aad0a2909bc29f5a634f413b43a4ff6ce59bada938e613741817d6-ol8_aarch64_baseos_latest
curl-7.61.1-18.el8_4.2.src.rpme0c754d8f5aad0a2909bc29f5a634f413b43a4ff6ce59bada938e613741817d6-ol8_aarch64_u4_baseos_patch
curl-7.61.1-18.el8_4.2.aarch64.rpm021b21e116d41608c3dff809f1f9e66b88ac777e8d5e64bed6f72a7b80ec72f5-ol8_aarch64_baseos_latest
curl-7.61.1-18.el8_4.2.aarch64.rpm021b21e116d41608c3dff809f1f9e66b88ac777e8d5e64bed6f72a7b80ec72f5-ol8_aarch64_u4_baseos_patch
libcurl-7.61.1-18.el8_4.2.aarch64.rpm791d04aed870443e9c1f51d5240b4fd25b826ae4ba90f6cb929e8f63768dc6a6-ol8_aarch64_baseos_latest
libcurl-7.61.1-18.el8_4.2.aarch64.rpm791d04aed870443e9c1f51d5240b4fd25b826ae4ba90f6cb929e8f63768dc6a6-ol8_aarch64_u4_baseos_patch
libcurl-devel-7.61.1-18.el8_4.2.aarch64.rpme1ba42a3056380c79240b62cd0b8f678d47b356426f9ae96236868fbc804502f-ol8_aarch64_baseos_latest
libcurl-devel-7.61.1-18.el8_4.2.aarch64.rpme1ba42a3056380c79240b62cd0b8f678d47b356426f9ae96236868fbc804502f-ol8_aarch64_u4_baseos_patch
libcurl-minimal-7.61.1-18.el8_4.2.aarch64.rpm307dfb1ab69310fc22419602308e55abef550926e5d749895db95da229446173-ol8_aarch64_baseos_latest
libcurl-minimal-7.61.1-18.el8_4.2.aarch64.rpm307dfb1ab69310fc22419602308e55abef550926e5d749895db95da229446173-ol8_aarch64_u4_baseos_patch
Oracle Linux 8 (x86_64) curl-7.61.1-18.el8_4.2.src.rpme0c754d8f5aad0a2909bc29f5a634f413b43a4ff6ce59bada938e613741817d6-ol8_x86_64_baseos_latest
curl-7.61.1-18.el8_4.2.src.rpme0c754d8f5aad0a2909bc29f5a634f413b43a4ff6ce59bada938e613741817d6-ol8_x86_64_u4_baseos_patch
curl-7.61.1-18.el8_4.2.x86_64.rpm78744310ced2422459b8eca44bc91e73b2434bb08ddc3301db074dcb4ed1cd42-ol8_x86_64_baseos_latest
curl-7.61.1-18.el8_4.2.x86_64.rpm78744310ced2422459b8eca44bc91e73b2434bb08ddc3301db074dcb4ed1cd42-ol8_x86_64_u4_baseos_patch
libcurl-7.61.1-18.el8_4.2.i686.rpm9449dace0feb224b09181a01dffd26525173b6c13d85d9da386058e19ea6e4d2-ol8_x86_64_baseos_latest
libcurl-7.61.1-18.el8_4.2.i686.rpm9449dace0feb224b09181a01dffd26525173b6c13d85d9da386058e19ea6e4d2-ol8_x86_64_u4_baseos_patch
libcurl-7.61.1-18.el8_4.2.x86_64.rpmb3f55caf296026ac9e2bfdc56b28818cdee77ee45a587a73200d5d414cc33290-ol8_x86_64_baseos_latest
libcurl-7.61.1-18.el8_4.2.x86_64.rpmb3f55caf296026ac9e2bfdc56b28818cdee77ee45a587a73200d5d414cc33290-ol8_x86_64_u4_baseos_patch
libcurl-devel-7.61.1-18.el8_4.2.i686.rpm4f5dacbc19540fb4a9a704d4f7d7910a2e2482d5f7fa5db4782af76df718063f-ol8_x86_64_baseos_latest
libcurl-devel-7.61.1-18.el8_4.2.i686.rpm4f5dacbc19540fb4a9a704d4f7d7910a2e2482d5f7fa5db4782af76df718063f-ol8_x86_64_u4_baseos_patch
libcurl-devel-7.61.1-18.el8_4.2.x86_64.rpm20dd8c08168369de1411a8cb6842044733ad1fb540f9c744b47ff5a5a59c0edf-ol8_x86_64_baseos_latest
libcurl-devel-7.61.1-18.el8_4.2.x86_64.rpm20dd8c08168369de1411a8cb6842044733ad1fb540f9c744b47ff5a5a59c0edf-ol8_x86_64_u4_baseos_patch
libcurl-minimal-7.61.1-18.el8_4.2.i686.rpm878b1ac4ebc1b85f7fe30ae3ccb0d0fd967ef7190901b82d3324c9c515a6be46-ol8_x86_64_baseos_latest
libcurl-minimal-7.61.1-18.el8_4.2.i686.rpm878b1ac4ebc1b85f7fe30ae3ccb0d0fd967ef7190901b82d3324c9c515a6be46-ol8_x86_64_u4_baseos_patch
libcurl-minimal-7.61.1-18.el8_4.2.x86_64.rpm293d27fd3168662e5b8866985cbcd8e062b21eb9418ceede96cb40269af1bbb3-ol8_x86_64_baseos_latest
libcurl-minimal-7.61.1-18.el8_4.2.x86_64.rpm293d27fd3168662e5b8866985cbcd8e062b21eb9418ceede96cb40269af1bbb3-ol8_x86_64_u4_baseos_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete