In the curl project, we take security seriously. We work hard to make sure we don't open up for security problems of any kind and once we fail, we work hard at analyzing the problem and coming up with a proper fix as swiftly as possible to make our "customer" as little vulnerable as possible.
Recently I've been surprised and slightly shocked by the fact that a lot of open source operating systems didn't release any security upgrades to our most recent security flaw until well over a month after we first publicized the flaw. I'm not sure why they all reacted so slowly. Possibly it is because vendor-sec isn't quite working as they were informed prior to the notification, and of course I don't really expect many security guys to be subscribed to the curl mailing lists. Slow distros include Debian and Mandriva while Redhat did great.
Today however, I got a mail from Apple (and no, I don't know why they send these mails to me but I guess they think I need them or something) with the subject "APPLE-SA-2010-03-29-1 Security Update 2010-002 / Mac OS X v10.6.3". Aha! Did Apple now also finally update their curl version you might think?
They did. But they did not fix this problem. They fixed two previous problems universally known as CVE-2009-0037 and CVE-2009-2417. Look at the date of that first one. March 3, 2009. Yes, a whopping 391 days after the problem was first made public, Apple sends out the security update. Cool. At least they eventually fixed the problem...