{"id":"RHSA-2016:2575","summary":"Red Hat Security Advisory: curl security, bug fix, and enhancement update","modified":"2025-11-22T11:14:04Z","published":"2024-09-13T14:37:20Z","upstream":["CVE-2016-5419","CVE-2016-5420","CVE-2016-7141"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:2575"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.3_Release_Notes/index.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1260178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1269855"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1275769"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1305974"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1347904"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362183"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362190"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1373229"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2575.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5419"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5419"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5419"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20160803A.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5420"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5420"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5420"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20160803B.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7141"},{"type":"ARTICLE","url":"https://curl.haxx.se/docs/adv_20160907.html"}],"affected":[{"package":{"name":"curl","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/curl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.29.0-35.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2575.json"}},{"package":{"name":"curl-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/curl-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.29.0-35.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2575.json"}},{"package":{"name":"libcurl","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/libcurl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.29.0-35.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2575.json"}},{"package":{"name":"libcurl-devel","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/libcurl-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.29.0-35.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2575.json"}},{"package":{"name":"curl","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/curl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.29.0-35.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2575.json"}},{"package":{"name":"curl-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/curl-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.29.0-35.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2575.json"}},{"package":{"name":"libcurl","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/libcurl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.29.0-35.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2575.json"}},{"package":{"name":"libcurl-devel","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/libcurl-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.29.0-35.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2575.json"}},{"package":{"name":"curl","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/curl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.29.0-35.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2575.json"}},{"package":{"name":"curl-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/curl-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.29.0-35.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2575.json"}},{"package":{"name":"libcurl","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/libcurl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.29.0-35.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2575.json"}},{"package":{"name":"libcurl-devel","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/libcurl-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.29.0-35.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2575.json"}},{"package":{"name":"curl","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/curl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.29.0-35.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2575.json"}},{"package":{"name":"curl-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/curl-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.29.0-35.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2575.json"}},{"package":{"name":"libcurl","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/libcurl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.29.0-35.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2575.json"}},{"package":{"name":"libcurl-devel","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/libcurl-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.29.0-35.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2575.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}]}