Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-14524 (GCVE-0-2025-14524)
Vulnerability from cvelistv5 – Published: 2026-01-08 10:07 – Updated: 2026-04-02 13:20| Vendor | Product | Version | |
|---|---|---|---|
| curl | curl |
Affected:
8.17.0 , ≤ 8.17.0
(semver)
Affected: 8.16.0 , ≤ 8.16.0 (semver) Affected: 8.15.0 , ≤ 8.15.0 (semver) Affected: 8.14.1 , ≤ 8.14.1 (semver) Affected: 8.14.0 , ≤ 8.14.0 (semver) Affected: 8.13.0 , ≤ 8.13.0 (semver) Affected: 8.12.1 , ≤ 8.12.1 (semver) Affected: 8.12.0 , ≤ 8.12.0 (semver) Affected: 8.11.1 , ≤ 8.11.1 (semver) Affected: 8.11.0 , ≤ 8.11.0 (semver) Affected: 8.10.1 , ≤ 8.10.1 (semver) Affected: 8.10.0 , ≤ 8.10.0 (semver) Affected: 8.9.1 , ≤ 8.9.1 (semver) Affected: 8.9.0 , ≤ 8.9.0 (semver) Affected: 8.8.0 , ≤ 8.8.0 (semver) Affected: 8.7.1 , ≤ 8.7.1 (semver) Affected: 8.7.0 , ≤ 8.7.0 (semver) Affected: 8.6.0 , ≤ 8.6.0 (semver) Affected: 8.5.0 , ≤ 8.5.0 (semver) Affected: 8.4.0 , ≤ 8.4.0 (semver) Affected: 8.3.0 , ≤ 8.3.0 (semver) Affected: 8.2.1 , ≤ 8.2.1 (semver) Affected: 8.2.0 , ≤ 8.2.0 (semver) Affected: 8.1.2 , ≤ 8.1.2 (semver) Affected: 8.1.1 , ≤ 8.1.1 (semver) Affected: 8.1.0 , ≤ 8.1.0 (semver) Affected: 8.0.1 , ≤ 8.0.1 (semver) Affected: 8.0.0 , ≤ 8.0.0 (semver) Affected: 7.88.1 , ≤ 7.88.1 (semver) Affected: 7.88.0 , ≤ 7.88.0 (semver) Affected: 7.87.0 , ≤ 7.87.0 (semver) Affected: 7.86.0 , ≤ 7.86.0 (semver) Affected: 7.85.0 , ≤ 7.85.0 (semver) Affected: 7.84.0 , ≤ 7.84.0 (semver) Affected: 7.83.1 , ≤ 7.83.1 (semver) Affected: 7.83.0 , ≤ 7.83.0 (semver) Affected: 7.82.0 , ≤ 7.82.0 (semver) Affected: 7.81.0 , ≤ 7.81.0 (semver) Affected: 7.80.0 , ≤ 7.80.0 (semver) Affected: 7.79.1 , ≤ 7.79.1 (semver) Affected: 7.79.0 , ≤ 7.79.0 (semver) Affected: 7.78.0 , ≤ 7.78.0 (semver) Affected: 7.77.0 , ≤ 7.77.0 (semver) Affected: 7.76.1 , ≤ 7.76.1 (semver) Affected: 7.76.0 , ≤ 7.76.0 (semver) Affected: 7.75.0 , ≤ 7.75.0 (semver) Affected: 7.74.0 , ≤ 7.74.0 (semver) Affected: 7.73.0 , ≤ 7.73.0 (semver) Affected: 7.72.0 , ≤ 7.72.0 (semver) Affected: 7.71.1 , ≤ 7.71.1 (semver) Affected: 7.71.0 , ≤ 7.71.0 (semver) Affected: 7.70.0 , ≤ 7.70.0 (semver) Affected: 7.69.1 , ≤ 7.69.1 (semver) Affected: 7.69.0 , ≤ 7.69.0 (semver) Affected: 7.68.0 , ≤ 7.68.0 (semver) Affected: 7.67.0 , ≤ 7.67.0 (semver) Affected: 7.66.0 , ≤ 7.66.0 (semver) Affected: 7.65.3 , ≤ 7.65.3 (semver) Affected: 7.65.2 , ≤ 7.65.2 (semver) Affected: 7.65.1 , ≤ 7.65.1 (semver) Affected: 7.65.0 , ≤ 7.65.0 (semver) Affected: 7.64.1 , ≤ 7.64.1 (semver) Affected: 7.64.0 , ≤ 7.64.0 (semver) Affected: 7.63.0 , ≤ 7.63.0 (semver) Affected: 7.62.0 , ≤ 7.62.0 (semver) Affected: 7.61.1 , ≤ 7.61.1 (semver) Affected: 7.61.0 , ≤ 7.61.0 (semver) Affected: 7.60.0 , ≤ 7.60.0 (semver) Affected: 7.59.0 , ≤ 7.59.0 (semver) Affected: 7.58.0 , ≤ 7.58.0 (semver) Affected: 7.57.0 , ≤ 7.57.0 (semver) Affected: 7.56.1 , ≤ 7.56.1 (semver) Affected: 7.56.0 , ≤ 7.56.0 (semver) Affected: 7.55.1 , ≤ 7.55.1 (semver) Affected: 7.55.0 , ≤ 7.55.0 (semver) Affected: 7.54.1 , ≤ 7.54.1 (semver) Affected: 7.54.0 , ≤ 7.54.0 (semver) Affected: 7.53.1 , ≤ 7.53.1 (semver) Affected: 7.53.0 , ≤ 7.53.0 (semver) Affected: 7.52.1 , ≤ 7.52.1 (semver) Affected: 7.52.0 , ≤ 7.52.0 (semver) Affected: 7.51.0 , ≤ 7.51.0 (semver) Affected: 7.50.3 , ≤ 7.50.3 (semver) Affected: 7.50.2 , ≤ 7.50.2 (semver) Affected: 7.50.1 , ≤ 7.50.1 (semver) Affected: 7.50.0 , ≤ 7.50.0 (semver) Affected: 7.49.1 , ≤ 7.49.1 (semver) Affected: 7.49.0 , ≤ 7.49.0 (semver) Affected: 7.48.0 , ≤ 7.48.0 (semver) Affected: 7.47.1 , ≤ 7.47.1 (semver) Affected: 7.47.0 , ≤ 7.47.0 (semver) Affected: 7.46.0 , ≤ 7.46.0 (semver) Affected: 7.45.0 , ≤ 7.45.0 (semver) Affected: 7.44.0 , ≤ 7.44.0 (semver) Affected: 7.43.0 , ≤ 7.43.0 (semver) Affected: 7.42.1 , ≤ 7.42.1 (semver) Affected: 7.42.0 , ≤ 7.42.0 (semver) Affected: 7.41.0 , ≤ 7.41.0 (semver) Affected: 7.40.0 , ≤ 7.40.0 (semver) Affected: 7.39.0 , ≤ 7.39.0 (semver) Affected: 7.38.0 , ≤ 7.38.0 (semver) Affected: 7.37.1 , ≤ 7.37.1 (semver) Affected: 7.37.0 , ≤ 7.37.0 (semver) Affected: 7.36.0 , ≤ 7.36.0 (semver) Affected: 7.35.0 , ≤ 7.35.0 (semver) Affected: 7.34.0 , ≤ 7.34.0 (semver) Affected: 7.33.0 , ≤ 7.33.0 (semver) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2026-01-08T11:06:18.117Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2026/01/07/4"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-14524",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-09T19:24:54.231955Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-02T13:20:16.344Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "curl",
"vendor": "curl",
"versions": [
{
"lessThanOrEqual": "8.17.0",
"status": "affected",
"version": "8.17.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.16.0",
"status": "affected",
"version": "8.16.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.15.0",
"status": "affected",
"version": "8.15.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.14.1",
"status": "affected",
"version": "8.14.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.14.0",
"status": "affected",
"version": "8.14.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.13.0",
"status": "affected",
"version": "8.13.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.12.1",
"status": "affected",
"version": "8.12.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.12.0",
"status": "affected",
"version": "8.12.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.11.1",
"status": "affected",
"version": "8.11.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.11.0",
"status": "affected",
"version": "8.11.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.10.1",
"status": "affected",
"version": "8.10.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.10.0",
"status": "affected",
"version": "8.10.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.9.1",
"status": "affected",
"version": "8.9.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.9.0",
"status": "affected",
"version": "8.9.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.8.0",
"status": "affected",
"version": "8.8.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.7.1",
"status": "affected",
"version": "8.7.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.7.0",
"status": "affected",
"version": "8.7.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.6.0",
"status": "affected",
"version": "8.6.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.5.0",
"status": "affected",
"version": "8.5.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.4.0",
"status": "affected",
"version": "8.4.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.3.0",
"status": "affected",
"version": "8.3.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.2.1",
"status": "affected",
"version": "8.2.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.2.0",
"status": "affected",
"version": "8.2.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.1.2",
"status": "affected",
"version": "8.1.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.1.1",
"status": "affected",
"version": "8.1.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.1.0",
"status": "affected",
"version": "8.1.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.0.1",
"status": "affected",
"version": "8.0.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.0.0",
"status": "affected",
"version": "8.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.88.1",
"status": "affected",
"version": "7.88.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.88.0",
"status": "affected",
"version": "7.88.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.87.0",
"status": "affected",
"version": "7.87.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.86.0",
"status": "affected",
"version": "7.86.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.85.0",
"status": "affected",
"version": "7.85.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.84.0",
"status": "affected",
"version": "7.84.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.83.1",
"status": "affected",
"version": "7.83.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.83.0",
"status": "affected",
"version": "7.83.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.82.0",
"status": "affected",
"version": "7.82.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.81.0",
"status": "affected",
"version": "7.81.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.80.0",
"status": "affected",
"version": "7.80.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.79.1",
"status": "affected",
"version": "7.79.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.79.0",
"status": "affected",
"version": "7.79.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.78.0",
"status": "affected",
"version": "7.78.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.77.0",
"status": "affected",
"version": "7.77.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.76.1",
"status": "affected",
"version": "7.76.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.76.0",
"status": "affected",
"version": "7.76.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.75.0",
"status": "affected",
"version": "7.75.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.74.0",
"status": "affected",
"version": "7.74.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.73.0",
"status": "affected",
"version": "7.73.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.72.0",
"status": "affected",
"version": "7.72.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.71.1",
"status": "affected",
"version": "7.71.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.71.0",
"status": "affected",
"version": "7.71.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.70.0",
"status": "affected",
"version": "7.70.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.69.1",
"status": "affected",
"version": "7.69.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.69.0",
"status": "affected",
"version": "7.69.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.68.0",
"status": "affected",
"version": "7.68.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.67.0",
"status": "affected",
"version": "7.67.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.66.0",
"status": "affected",
"version": "7.66.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.65.3",
"status": "affected",
"version": "7.65.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.65.2",
"status": "affected",
"version": "7.65.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.65.1",
"status": "affected",
"version": "7.65.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.65.0",
"status": "affected",
"version": "7.65.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.64.1",
"status": "affected",
"version": "7.64.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.64.0",
"status": "affected",
"version": "7.64.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.63.0",
"status": "affected",
"version": "7.63.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.62.0",
"status": "affected",
"version": "7.62.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.61.1",
"status": "affected",
"version": "7.61.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.61.0",
"status": "affected",
"version": "7.61.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.60.0",
"status": "affected",
"version": "7.60.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.59.0",
"status": "affected",
"version": "7.59.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.58.0",
"status": "affected",
"version": "7.58.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.57.0",
"status": "affected",
"version": "7.57.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.56.1",
"status": "affected",
"version": "7.56.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.56.0",
"status": "affected",
"version": "7.56.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.55.1",
"status": "affected",
"version": "7.55.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.55.0",
"status": "affected",
"version": "7.55.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.54.1",
"status": "affected",
"version": "7.54.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.54.0",
"status": "affected",
"version": "7.54.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.53.1",
"status": "affected",
"version": "7.53.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.53.0",
"status": "affected",
"version": "7.53.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.52.1",
"status": "affected",
"version": "7.52.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.52.0",
"status": "affected",
"version": "7.52.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.51.0",
"status": "affected",
"version": "7.51.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.50.3",
"status": "affected",
"version": "7.50.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.50.2",
"status": "affected",
"version": "7.50.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.50.1",
"status": "affected",
"version": "7.50.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.50.0",
"status": "affected",
"version": "7.50.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.49.1",
"status": "affected",
"version": "7.49.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.49.0",
"status": "affected",
"version": "7.49.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.48.0",
"status": "affected",
"version": "7.48.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.47.1",
"status": "affected",
"version": "7.47.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.47.0",
"status": "affected",
"version": "7.47.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.46.0",
"status": "affected",
"version": "7.46.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.45.0",
"status": "affected",
"version": "7.45.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.44.0",
"status": "affected",
"version": "7.44.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.43.0",
"status": "affected",
"version": "7.43.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.42.1",
"status": "affected",
"version": "7.42.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.42.0",
"status": "affected",
"version": "7.42.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.41.0",
"status": "affected",
"version": "7.41.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.40.0",
"status": "affected",
"version": "7.40.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.39.0",
"status": "affected",
"version": "7.39.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.38.0",
"status": "affected",
"version": "7.38.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.37.1",
"status": "affected",
"version": "7.37.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.37.0",
"status": "affected",
"version": "7.37.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.36.0",
"status": "affected",
"version": "7.36.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.35.0",
"status": "affected",
"version": "7.35.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.34.0",
"status": "affected",
"version": "7.34.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.33.0",
"status": "affected",
"version": "7.33.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "anonymous237 on hackerone"
},
{
"lang": "en",
"type": "remediation developer",
"value": "Daniel Stenberg"
}
],
"descriptions": [
{
"lang": "en",
"value": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-522 Insufficiently Protected Credentials",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-08T10:07:25.655Z",
"orgId": "2499f714-1537-4658-8207-48ae4bb9eae9",
"shortName": "curl"
},
"references": [
{
"name": "json",
"url": "https://curl.se/docs/CVE-2025-14524.json"
},
{
"name": "www",
"url": "https://curl.se/docs/CVE-2025-14524.html"
},
{
"name": "issue",
"url": "https://hackerone.com/reports/3459417"
}
],
"title": "bearer token leak on cross-protocol redirect"
}
},
"cveMetadata": {
"assignerOrgId": "2499f714-1537-4658-8207-48ae4bb9eae9",
"assignerShortName": "curl",
"cveId": "CVE-2025-14524",
"datePublished": "2026-01-08T10:07:25.655Z",
"dateReserved": "2025-12-11T08:04:14.328Z",
"dateUpdated": "2026-04-02T13:20:16.344Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-14524",
"date": "2026-05-23",
"epss": "0.0004",
"percentile": "0.12391"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-14524\",\"sourceIdentifier\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"published\":\"2026-01-08T10:15:46.607\",\"lastModified\":\"2026-01-20T14:53:11.017\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\\ntarget host.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-601\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.33.0\",\"versionEndExcluding\":\"8.18.0\",\"matchCriteriaId\":\"A68C0C39-B32A-4FED-A179-1BF16B8E0E1C\"}]}]}],\"references\":[{\"url\":\"https://curl.se/docs/CVE-2025-14524.html\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Vendor Advisory\",\"Patch\"]},{\"url\":\"https://curl.se/docs/CVE-2025-14524.json\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://hackerone.com/reports/3459417\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2026/01/07/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\",\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2026/01/07/4\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2026-01-08T11:06:18.117Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-14524\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-09T19:24:54.231955Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-09T19:25:18.454Z\"}}], \"cna\": {\"title\": \"bearer token leak on cross-protocol redirect\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"anonymous237 on hackerone\"}, {\"lang\": \"en\", \"type\": \"remediation developer\", \"value\": \"Daniel Stenberg\"}], \"affected\": [{\"vendor\": \"curl\", \"product\": \"curl\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.17.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.17.0\"}, {\"status\": \"affected\", \"version\": \"8.16.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.16.0\"}, {\"status\": \"affected\", \"version\": \"8.15.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.15.0\"}, {\"status\": \"affected\", \"version\": \"8.14.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.14.1\"}, {\"status\": \"affected\", \"version\": \"8.14.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.14.0\"}, {\"status\": \"affected\", \"version\": \"8.13.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.13.0\"}, {\"status\": \"affected\", \"version\": \"8.12.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.12.1\"}, {\"status\": \"affected\", \"version\": \"8.12.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.12.0\"}, {\"status\": \"affected\", \"version\": \"8.11.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.11.1\"}, {\"status\": \"affected\", \"version\": \"8.11.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.11.0\"}, {\"status\": \"affected\", \"version\": \"8.10.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.10.1\"}, {\"status\": \"affected\", \"version\": \"8.10.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.10.0\"}, {\"status\": \"affected\", \"version\": \"8.9.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.9.1\"}, {\"status\": \"affected\", \"version\": \"8.9.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.9.0\"}, {\"status\": \"affected\", \"version\": \"8.8.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.8.0\"}, {\"status\": \"affected\", \"version\": \"8.7.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.7.1\"}, {\"status\": \"affected\", \"version\": \"8.7.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.7.0\"}, {\"status\": \"affected\", \"version\": \"8.6.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.6.0\"}, {\"status\": \"affected\", \"version\": \"8.5.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.5.0\"}, {\"status\": \"affected\", \"version\": \"8.4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.4.0\"}, {\"status\": \"affected\", \"version\": \"8.3.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.3.0\"}, {\"status\": \"affected\", \"version\": \"8.2.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.2.1\"}, {\"status\": \"affected\", \"version\": \"8.2.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.2.0\"}, {\"status\": \"affected\", \"version\": \"8.1.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1.2\"}, {\"status\": \"affected\", \"version\": \"8.1.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1.1\"}, {\"status\": \"affected\", \"version\": \"8.1.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1.0\"}, {\"status\": \"affected\", \"version\": \"8.0.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.0.1\"}, {\"status\": \"affected\", \"version\": \"8.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.0.0\"}, {\"status\": \"affected\", \"version\": \"7.88.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.88.1\"}, {\"status\": \"affected\", \"version\": \"7.88.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.88.0\"}, {\"status\": \"affected\", \"version\": \"7.87.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.87.0\"}, {\"status\": \"affected\", \"version\": \"7.86.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.86.0\"}, {\"status\": \"affected\", \"version\": \"7.85.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.85.0\"}, {\"status\": \"affected\", \"version\": \"7.84.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.84.0\"}, {\"status\": \"affected\", \"version\": \"7.83.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.83.1\"}, {\"status\": \"affected\", \"version\": \"7.83.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.83.0\"}, {\"status\": \"affected\", \"version\": \"7.82.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.82.0\"}, {\"status\": \"affected\", \"version\": \"7.81.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.81.0\"}, {\"status\": \"affected\", \"version\": \"7.80.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.80.0\"}, {\"status\": \"affected\", \"version\": \"7.79.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.79.1\"}, {\"status\": \"affected\", \"version\": \"7.79.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.79.0\"}, {\"status\": \"affected\", \"version\": \"7.78.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.78.0\"}, {\"status\": \"affected\", \"version\": \"7.77.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.77.0\"}, {\"status\": \"affected\", \"version\": \"7.76.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.76.1\"}, {\"status\": \"affected\", \"version\": \"7.76.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.76.0\"}, {\"status\": \"affected\", \"version\": \"7.75.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.75.0\"}, {\"status\": \"affected\", \"version\": \"7.74.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.74.0\"}, {\"status\": \"affected\", \"version\": \"7.73.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.73.0\"}, {\"status\": \"affected\", \"version\": \"7.72.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.72.0\"}, {\"status\": \"affected\", \"version\": \"7.71.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.71.1\"}, {\"status\": \"affected\", \"version\": \"7.71.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.71.0\"}, {\"status\": \"affected\", \"version\": \"7.70.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.70.0\"}, {\"status\": \"affected\", \"version\": \"7.69.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.69.1\"}, {\"status\": \"affected\", \"version\": \"7.69.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.69.0\"}, {\"status\": \"affected\", \"version\": \"7.68.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.68.0\"}, {\"status\": \"affected\", \"version\": \"7.67.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.67.0\"}, {\"status\": \"affected\", \"version\": \"7.66.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.66.0\"}, {\"status\": \"affected\", \"version\": \"7.65.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.65.3\"}, {\"status\": \"affected\", \"version\": \"7.65.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.65.2\"}, {\"status\": \"affected\", \"version\": \"7.65.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.65.1\"}, {\"status\": \"affected\", \"version\": \"7.65.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.65.0\"}, {\"status\": \"affected\", \"version\": \"7.64.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.64.1\"}, {\"status\": \"affected\", \"version\": \"7.64.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.64.0\"}, {\"status\": \"affected\", \"version\": \"7.63.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.63.0\"}, {\"status\": \"affected\", \"version\": \"7.62.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.62.0\"}, {\"status\": \"affected\", \"version\": \"7.61.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.61.1\"}, {\"status\": \"affected\", \"version\": \"7.61.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.61.0\"}, {\"status\": \"affected\", \"version\": \"7.60.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.60.0\"}, {\"status\": \"affected\", \"version\": \"7.59.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.59.0\"}, {\"status\": \"affected\", \"version\": \"7.58.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.58.0\"}, {\"status\": \"affected\", \"version\": \"7.57.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.57.0\"}, {\"status\": \"affected\", \"version\": \"7.56.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.56.1\"}, {\"status\": \"affected\", \"version\": \"7.56.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.56.0\"}, {\"status\": \"affected\", \"version\": \"7.55.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.55.1\"}, {\"status\": \"affected\", \"version\": \"7.55.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.55.0\"}, {\"status\": \"affected\", \"version\": \"7.54.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.54.1\"}, {\"status\": \"affected\", \"version\": \"7.54.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.54.0\"}, {\"status\": \"affected\", \"version\": \"7.53.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.53.1\"}, {\"status\": \"affected\", \"version\": \"7.53.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.53.0\"}, {\"status\": \"affected\", \"version\": \"7.52.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.52.1\"}, {\"status\": \"affected\", \"version\": \"7.52.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.52.0\"}, {\"status\": \"affected\", \"version\": \"7.51.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.51.0\"}, {\"status\": \"affected\", \"version\": \"7.50.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.50.3\"}, {\"status\": \"affected\", \"version\": \"7.50.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.50.2\"}, {\"status\": \"affected\", \"version\": \"7.50.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.50.1\"}, {\"status\": \"affected\", \"version\": \"7.50.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.50.0\"}, {\"status\": \"affected\", \"version\": \"7.49.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.49.1\"}, {\"status\": \"affected\", \"version\": \"7.49.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.49.0\"}, {\"status\": \"affected\", \"version\": \"7.48.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.48.0\"}, {\"status\": \"affected\", \"version\": \"7.47.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.47.1\"}, {\"status\": \"affected\", \"version\": \"7.47.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.47.0\"}, {\"status\": \"affected\", \"version\": \"7.46.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.46.0\"}, {\"status\": \"affected\", \"version\": \"7.45.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.45.0\"}, {\"status\": \"affected\", \"version\": \"7.44.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.44.0\"}, {\"status\": \"affected\", \"version\": \"7.43.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.43.0\"}, {\"status\": \"affected\", \"version\": \"7.42.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.42.1\"}, {\"status\": \"affected\", \"version\": \"7.42.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.42.0\"}, {\"status\": \"affected\", \"version\": \"7.41.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.41.0\"}, {\"status\": \"affected\", \"version\": \"7.40.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.40.0\"}, {\"status\": \"affected\", \"version\": \"7.39.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.39.0\"}, {\"status\": \"affected\", \"version\": \"7.38.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.38.0\"}, {\"status\": \"affected\", \"version\": \"7.37.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.37.1\"}, {\"status\": \"affected\", \"version\": \"7.37.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.37.0\"}, {\"status\": \"affected\", \"version\": \"7.36.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.36.0\"}, {\"status\": \"affected\", \"version\": \"7.35.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.35.0\"}, {\"status\": \"affected\", \"version\": \"7.34.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.34.0\"}, {\"status\": \"affected\", \"version\": \"7.33.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.33.0\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://curl.se/docs/CVE-2025-14524.json\", \"name\": \"json\"}, {\"url\": \"https://curl.se/docs/CVE-2025-14524.html\", \"name\": \"www\"}, {\"url\": \"https://hackerone.com/reports/3459417\", \"name\": \"issue\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\\ntarget host.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-522 Insufficiently Protected Credentials\"}]}], \"providerMetadata\": {\"orgId\": \"2499f714-1537-4658-8207-48ae4bb9eae9\", \"shortName\": \"curl\", \"dateUpdated\": \"2026-01-08T10:07:25.655Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-14524\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-02T13:20:16.344Z\", \"dateReserved\": \"2025-12-11T08:04:14.328Z\", \"assignerOrgId\": \"2499f714-1537-4658-8207-48ae4bb9eae9\", \"datePublished\": \"2026-01-08T10:07:25.655Z\", \"assignerShortName\": \"curl\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2026-AVI-0592
Vulnerability from certfr_avis - Published: 2026-05-15 - Updated: 2026-05-15
De multiples vulnérabilités ont été découvertes dans Tenable Network Monitor. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Network Monitor versions ant\u00e9rieures \u00e0 6.5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
}
],
"initial_release_date": "2026-05-15T00:00:00",
"last_revision_date": "2026-05-15T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0592",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-05-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Network Monitor. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Network Monitor",
"vendor_advisories": [
{
"published_at": "2026-05-14",
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2026-14",
"url": "https://www.tenable.com/security/tns-2026-14"
}
]
}
FKIE_CVE-2025-14524
Vulnerability from fkie_nvd - Published: 2026-01-08 10:15 - Updated: 2026-01-20 14:53| URL | Tags | ||
|---|---|---|---|
| 2499f714-1537-4658-8207-48ae4bb9eae9 | https://curl.se/docs/CVE-2025-14524.html | Vendor Advisory, Patch | |
| 2499f714-1537-4658-8207-48ae4bb9eae9 | https://curl.se/docs/CVE-2025-14524.json | Vendor Advisory | |
| 2499f714-1537-4658-8207-48ae4bb9eae9 | https://hackerone.com/reports/3459417 | Exploit, Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2026/01/07/4 | Mailing List, Third Party Advisory, Patch |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A68C0C39-B32A-4FED-A179-1BF16B8E0E1C",
"versionEndExcluding": "8.18.0",
"versionStartIncluding": "7.33.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host."
},
{
"lang": "es",
"value": "Cuando se utiliza un token portador de OAuth2 para una transferencia HTTP(S), y esa transferencia realiza una redirecci\u00f3n entre protocolos a una segunda URL que utiliza un esquema IMAP, LDAP, POP3 o SMTP, curl podr\u00eda pasar err\u00f3neamente el token portador al nuevo host de destino."
}
],
"id": "CVE-2025-14524",
"lastModified": "2026-01-20T14:53:11.017",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-01-08T10:15:46.607",
"references": [
{
"source": "2499f714-1537-4658-8207-48ae4bb9eae9",
"tags": [
"Vendor Advisory",
"Patch"
],
"url": "https://curl.se/docs/CVE-2025-14524.html"
},
{
"source": "2499f714-1537-4658-8207-48ae4bb9eae9",
"tags": [
"Vendor Advisory"
],
"url": "https://curl.se/docs/CVE-2025-14524.json"
},
{
"source": "2499f714-1537-4658-8207-48ae4bb9eae9",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/3459417"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory",
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2026/01/07/4"
}
],
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-601"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-G897-JVJX-78VG
Vulnerability from github – Published: 2026-01-08 12:30 – Updated: 2026-01-09 21:31When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.
{
"affected": [],
"aliases": [
"CVE-2025-14524"
],
"database_specific": {
"cwe_ids": [
"CWE-601"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-01-08T10:15:46Z",
"severity": "MODERATE"
},
"details": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"id": "GHSA-g897-jvjx-78vg",
"modified": "2026-01-09T21:31:34Z",
"published": "2026-01-08T12:30:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14524"
},
{
"type": "WEB",
"url": "https://hackerone.com/reports/3459417"
},
{
"type": "WEB",
"url": "https://curl.se/docs/CVE-2025-14524.html"
},
{
"type": "WEB",
"url": "https://curl.se/docs/CVE-2025-14524.json"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/01/07/4"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
MSRC_CVE-2025-14524
Vulnerability from csaf_microsoft - Published: 2026-01-02 00:00 - Updated: 2026-03-10 01:38| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 20870-17086 | — | ||
| Unresolved product id: 20872-17084 | — | ||
| Unresolved product id: 20974-17084 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17084-3 | — | ||
| Unresolved product id: 17084-19 | — | ||
| Unresolved product id: 17086-20 | — | ||
| Unresolved product id: 17086-16 | — | ||
| Unresolved product id: 17086-17 | — | ||
| Unresolved product id: 17086-21 | — | ||
| Unresolved product id: 17084-15 | — | ||
| Unresolved product id: 17084-13 | — | ||
| Unresolved product id: 17084-12 | — | ||
| Unresolved product id: 17084-22 | — | ||
| Unresolved product id: 17084-8 | — | ||
| Unresolved product id: 17086-6 | — | ||
| Unresolved product id: 17086-2 | — | ||
| Unresolved product id: 17086-4 | — | ||
| Unresolved product id: 17084-10 | — | ||
| Unresolved product id: 17084-9 | — | ||
| Unresolved product id: 17084-11 | — |
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-14524 bearer token leak on cross-protocol redirect - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2025-14524.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "bearer token leak on cross-protocol redirect",
"tracking": {
"current_release_date": "2026-03-10T01:38:55.000Z",
"generator": {
"date": "2026-03-10T07:09:26.795Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-14524",
"initial_release_date": "2026-01-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-01-09T01:09:12.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-01-11T01:01:16.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-01-13T01:02:39.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
},
{
"date": "2026-01-13T01:40:36.000Z",
"legacy_version": "4",
"number": "4",
"summary": "Information published."
},
{
"date": "2026-02-18T14:07:49.000Z",
"legacy_version": "5",
"number": "5",
"summary": "Information published."
},
{
"date": "2026-02-21T03:27:56.000Z",
"legacy_version": "6",
"number": "6",
"summary": "Information published."
},
{
"date": "2026-03-04T14:47:10.000Z",
"legacy_version": "7",
"number": "7",
"summary": "Information published."
},
{
"date": "2026-03-10T01:38:55.000Z",
"legacy_version": "8",
"number": "8",
"summary": "Information published."
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 cmake 3.30.3-10",
"product": {
"name": "azl3 cmake 3.30.3-10",
"product_id": "18"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 cmake 3.21.4-21",
"product": {
"name": "\u003ccbl2 cmake 3.21.4-21",
"product_id": "7"
}
},
{
"category": "product_version",
"name": "cbl2 cmake 3.21.4-21",
"product": {
"name": "cbl2 cmake 3.21.4-21",
"product_id": "20870"
}
},
{
"category": "product_version_range",
"name": "cbl2 cmake 3.21.4-20",
"product": {
"name": "cbl2 cmake 3.21.4-20",
"product_id": "14"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 cmake 3.30.3-11",
"product": {
"name": "\u003cazl3 cmake 3.30.3-11",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "azl3 cmake 3.30.3-11",
"product": {
"name": "azl3 cmake 3.30.3-11",
"product_id": "20872"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 cmake 3.30.3-12",
"product": {
"name": "\u003cazl3 cmake 3.30.3-12",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 cmake 3.30.3-12",
"product": {
"name": "azl3 cmake 3.30.3-12",
"product_id": "20974"
}
}
],
"category": "product_name",
"name": "cmake"
},
{
"category": "product_name",
"name": "azl3 mysql 8.0.45-1",
"product": {
"name": "azl3 mysql 8.0.45-1",
"product_id": "3"
}
},
{
"category": "product_name",
"name": "azl3 curl 8.11.1-4",
"product": {
"name": "azl3 curl 8.11.1-4",
"product_id": "19"
}
},
{
"category": "product_name",
"name": "cbl2 curl 8.8.0-7",
"product": {
"name": "cbl2 curl 8.8.0-7",
"product_id": "20"
}
},
{
"category": "product_name",
"name": "cbl2 mysql 8.0.44-2",
"product": {
"name": "cbl2 mysql 8.0.44-2",
"product_id": "16"
}
},
{
"category": "product_name",
"name": "cbl2 rust 1.72.0-11",
"product": {
"name": "cbl2 rust 1.72.0-11",
"product_id": "17"
}
},
{
"category": "product_name",
"name": "cbl2 tensorflow 2.11.1-2",
"product": {
"name": "cbl2 tensorflow 2.11.1-2",
"product_id": "21"
}
},
{
"category": "product_name",
"name": "azl3 mysql 8.0.44-2",
"product": {
"name": "azl3 mysql 8.0.44-2",
"product_id": "15"
}
},
{
"category": "product_name",
"name": "azl3 rust 1.75.0-22",
"product": {
"name": "azl3 rust 1.75.0-22",
"product_id": "13"
}
},
{
"category": "product_name",
"name": "azl3 rust 1.86.0-10",
"product": {
"name": "azl3 rust 1.86.0-10",
"product_id": "12"
}
},
{
"category": "product_name",
"name": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "azl3 tensorflow 2.16.1-9",
"product_id": "22"
}
},
{
"category": "product_name",
"name": "azl3 curl 8.11.1-5",
"product": {
"name": "azl3 curl 8.11.1-5",
"product_id": "8"
}
},
{
"category": "product_name",
"name": "cbl2 curl 8.8.0-8",
"product": {
"name": "cbl2 curl 8.8.0-8",
"product_id": "6"
}
},
{
"category": "product_name",
"name": "cbl2 mysql 8.0.45-1",
"product": {
"name": "cbl2 mysql 8.0.45-1",
"product_id": "2"
}
},
{
"category": "product_name",
"name": "cbl2 rust 1.72.0-13",
"product": {
"name": "cbl2 rust 1.72.0-13",
"product_id": "4"
}
},
{
"category": "product_name",
"name": "azl3 rust 1.75.0-24",
"product": {
"name": "azl3 rust 1.75.0-24",
"product_id": "10"
}
},
{
"category": "product_name",
"name": "azl3 rust 1.90.0-3",
"product": {
"name": "azl3 rust 1.90.0-3",
"product_id": "9"
}
},
{
"category": "product_name",
"name": "azl3 tensorflow 2.16.1-10",
"product": {
"name": "azl3 tensorflow 2.16.1-10",
"product_id": "11"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 cmake 3.30.3-10 as a component of Azure Linux 3.0",
"product_id": "17084-18"
},
"product_reference": "18",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 cmake 3.21.4-21 as a component of CBL Mariner 2.0",
"product_id": "17086-7"
},
"product_reference": "7",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 cmake 3.21.4-21 as a component of CBL Mariner 2.0",
"product_id": "20870-17086"
},
"product_reference": "20870",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 mysql 8.0.45-1 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 curl 8.11.1-4 as a component of Azure Linux 3.0",
"product_id": "17084-19"
},
"product_reference": "19",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 curl 8.8.0-7 as a component of CBL Mariner 2.0",
"product_id": "17086-20"
},
"product_reference": "20",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 cmake 3.21.4-20 as a component of CBL Mariner 2.0",
"product_id": "17086-14"
},
"product_reference": "14",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 mysql 8.0.44-2 as a component of CBL Mariner 2.0",
"product_id": "17086-16"
},
"product_reference": "16",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 rust 1.72.0-11 as a component of CBL Mariner 2.0",
"product_id": "17086-17"
},
"product_reference": "17",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 tensorflow 2.11.1-2 as a component of CBL Mariner 2.0",
"product_id": "17086-21"
},
"product_reference": "21",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 mysql 8.0.44-2 as a component of Azure Linux 3.0",
"product_id": "17084-15"
},
"product_reference": "15",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rust 1.75.0-22 as a component of Azure Linux 3.0",
"product_id": "17084-13"
},
"product_reference": "13",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rust 1.86.0-10 as a component of Azure Linux 3.0",
"product_id": "17084-12"
},
"product_reference": "12",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 2.16.1-9 as a component of Azure Linux 3.0",
"product_id": "17084-22"
},
"product_reference": "22",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 cmake 3.30.3-11 as a component of Azure Linux 3.0",
"product_id": "17084-5"
},
"product_reference": "5",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 cmake 3.30.3-11 as a component of Azure Linux 3.0",
"product_id": "20872-17084"
},
"product_reference": "20872",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 curl 8.11.1-5 as a component of Azure Linux 3.0",
"product_id": "17084-8"
},
"product_reference": "8",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 curl 8.8.0-8 as a component of CBL Mariner 2.0",
"product_id": "17086-6"
},
"product_reference": "6",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 mysql 8.0.45-1 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 rust 1.72.0-13 as a component of CBL Mariner 2.0",
"product_id": "17086-4"
},
"product_reference": "4",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rust 1.75.0-24 as a component of Azure Linux 3.0",
"product_id": "17084-10"
},
"product_reference": "10",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rust 1.90.0-3 as a component of Azure Linux 3.0",
"product_id": "17084-9"
},
"product_reference": "9",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 2.16.1-10 as a component of Azure Linux 3.0",
"product_id": "17084-11"
},
"product_reference": "11",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 cmake 3.30.3-12 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 cmake 3.30.3-12 as a component of Azure Linux 3.0",
"product_id": "20974-17084"
},
"product_reference": "20974",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14524",
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17086-21",
"17084-22",
"17084-11"
]
},
{
"label": "vulnerable_code_not_in_execute_path",
"product_ids": [
"17086-17",
"17084-13",
"17084-12",
"17086-4",
"17084-10",
"17084-9"
]
},
{
"label": "vulnerable_code_not_present",
"product_ids": [
"17084-3",
"17084-19",
"17086-20",
"17086-16",
"17084-15",
"17084-8",
"17086-6",
"17086-2"
]
}
],
"notes": [
{
"category": "general",
"text": "curl",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20870-17086",
"20872-17084",
"20974-17084"
],
"known_affected": [
"17084-18",
"17086-7",
"17086-14",
"17084-5",
"17084-1"
],
"known_not_affected": [
"17084-3",
"17084-19",
"17086-20",
"17086-16",
"17086-17",
"17086-21",
"17084-15",
"17084-13",
"17084-12",
"17084-22",
"17084-8",
"17086-6",
"17086-2",
"17086-4",
"17084-10",
"17084-9",
"17084-11"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-14524 bearer token leak on cross-protocol redirect - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2025-14524.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2026-01-09T01:09:12.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-18"
]
},
{
"category": "none_available",
"date": "2026-01-09T01:09:12.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-14"
]
},
{
"category": "vendor_fix",
"date": "2026-01-09T01:09:12.000Z",
"details": "3.21.4-22:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-7"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2026-01-09T01:09:12.000Z",
"details": "3.30.3-12:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-5",
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"title": "bearer token leak on cross-protocol redirect"
}
]
}
NCSC-2026-0101
Vulnerability from csaf_ncscnl - Published: 2026-03-25 14:02 - Updated: 2026-03-25 14:02A vulnerability in libcurl versions 7.33.0 to 8.17.0 causes OAuth2 bearer tokens to be unintentionally leaked during cross-protocol redirects involving IMAP, LDAP, POP3, or SMTP schemes, potentially exposing sensitive information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A logic issue affecting state management in multiple Apple OS versions was fixed to prevent remote attackers from viewing leaked DNS queries when Private Relay is enabled.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
An improved validation fixed a path handling vulnerability in iOS 18.7.7, iPadOS 18.7.7, iOS 26.2, and iPadOS 26.2 that could allow a user with physical access to bypass Activation Lock.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
Multiple vulnerabilities in libpng, including heap buffer overflows and over-reads in functions like png_do_quantize, affect various products including NetApp and Apple software, alongside a separate Oracle MySQL Workbench flaw allowing unauthorized data modification or denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
Improved memory handling in iOS 18.7.7, iPadOS 18.7.7, macOS Sequoia 15.7.5, and macOS Sonoma 14.8.5 fixed an issue where parsing a maliciously crafted file could cause unexpected app termination.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
Apple fixed a vulnerability in multiple operating systems and Safari versions 26.4 and iOS/iPadOS 18.7.7 where malicious web content could bypass Content Security Policy enforcement due to improper state management.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A logging issue affecting iOS, iPadOS, macOS, and visionOS was fixed by enhancing data redaction to prevent apps from accessing sensitive user information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A use after free vulnerability in multiple Apple operating systems was fixed by improving memory management to prevent apps from causing unexpected system termination or writing to kernel memory.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A path handling vulnerability allowing applications to potentially escape their sandbox was fixed through improved validation in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, and visionOS 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
An out-of-bounds access vulnerability in Apple operating systems was fixed by improving bounds checking to prevent process termination caused by maliciously crafted audio streams.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
An authorization vulnerability in Safari 26.4 and related OS versions was resolved by enhancing state management to prevent malicious webpages from fingerprinting users.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A privacy issue affecting user preferences for mail content handling, specifically the 'Hide IP Address' and 'Block All Remote Content' features, was fixed in iOS 26.4, iPadOS 26.4, and various macOS versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A memory handling vulnerability in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4 could allow an app to cause unexpected system termination or kernel memory corruption, which was resolved through improved memory management.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A type confusion vulnerability related to memory handling in multiple Apple operating systems could allow an attacker to cause unexpected application termination.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A permissions issue allowing apps to enumerate a user’s installed applications was fixed by implementing additional restrictions in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A stack overflow vulnerability allowing denial-of-service was fixed by improving input validation across multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
An authentication vulnerability allowing physical attackers to access sensitive user information on locked devices was fixed in iOS 26.4, iPadOS 26.4, visionOS 26.4, and watchOS 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
Improved memory handling in Safari 26.4, iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4 fixed an issue where processing maliciously crafted web content could cause unexpected process crashes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A buffer overflow vulnerability in iOS 26.4 and iPadOS 26.4 was fixed by improved bounds checking to prevent remote system termination or kernel memory corruption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A memory handling vulnerability in Safari 26.4 and related OS versions was fixed, preventing malicious websites from processing restricted web content outside the sandbox environment.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A logic issue in state management was fixed across multiple Apple operating systems to prevent malicious websites from accessing script message handlers intended for other origins.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A permissions issue allowing apps to fingerprint users was fixed by adding restrictions in iOS 26.4, iPadOS 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
Apple addressed a vulnerability in iOS, iPadOS, macOS, visionOS, and watchOS by enhancing permissions checks to prevent local attackers from accessing users' Keychain items.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
An authentication vulnerability in multiple Apple operating systems was addressed by improving state management to prevent attackers in privileged network positions from intercepting network traffic.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
Multiple Apple operating systems including iOS 18.7.7, iPadOS 18.7.7, iOS 26.4, iPadOS 26.4, and various macOS versions addressed a vulnerability where improper symlink validation allowed apps to access sensitive user data.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A vulnerability allowing apps to potentially leak sensitive kernel state was fixed through improved authentication in multiple Apple operating systems including iOS 18.7.7, iPadOS 18.7.7, and macOS Sequoia 15.7.5.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A logging issue in multiple Apple operating systems including iOS, iPadOS, macOS, visionOS, and watchOS was fixed by improving data redaction to prevent apps from disclosing kernel memory.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
An information leakage vulnerability allowing unauthorized access to sensitive user data was fixed through additional validation in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A logic issue in Safari, iOS, iPadOS, and macOS was fixed through improved checks to prevent cross-site scripting attacks from malicious websites.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
iOS 26.4 and iPadOS 26.4 addressed an issue where improved validation checks prevent remote attackers from causing unexpected app termination.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A buffer overflow vulnerability in iOS 26.4 and iPadOS 26.4 was fixed by implementing improved bounds checking to prevent remote denial-of-service attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A parsing issue in directory path handling was fixed by improving path validation across multiple OS versions to prevent unauthorized app access to sensitive user data.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
An authorization vulnerability allowing apps to potentially access sensitive user data was resolved by enhancing state management in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, visionOS 26.4, and watchOS 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
Apple addressed a privacy vulnerability that allowed apps to enumerate installed applications by removing sensitive data in updates to iOS 18.7.7, iPadOS 18.7.7, macOS Sonoma 14.8.5, and other operating systems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A use-after-free vulnerability causing potential process crashes when handling malicious web content was fixed through improved memory management in multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
Multiple Apple operating systems including iOS, iPadOS, macOS, and visionOS addressed a permissions issue by implementing additional restrictions to prevent apps from enumerating a user’s installed applications.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
An issue allowing apps to enumerate a user's installed applications was resolved through enhanced verification mechanisms in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A null pointer dereference vulnerability allowing a privileged network user to cause denial-of-service was fixed via improved input validation in multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A denial-of-service vulnerability in iOS 26.4, iPadOS 26.4, and multiple macOS versions was addressed by improved input validation to prevent remote attackers from causing service disruptions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
iOS and iPadOS 16.4 fixed a vulnerability allowing attackers with physical access to bypass biometrics-gated Protected Apps by using the passcode on devices with Stolen Device Protection enabled through improved verification checks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Apple heeft meerdere kwetsbaarheden verholpen in iOS en iPadOS.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden omvatten verschillende problemen zoals onjuist padbeheer, geheugenbeheer, en onvoldoende validatie van invoer, die konden leiden tot ongeautoriseerde toegang tot gevoelige gegevens, onverwachte applicatie-terminaties, en andere beveiligingsrisico\u0027s. Aanvallers kunnen deze kwetsbaarheden misbruiken door bijvoorbeeld kwaadaardige webinhoud te verwerken of door gebruik te maken van onvoldoende beveiligde applicaties. De kwetsbaarheden zijn opgelost door verbeterde validatie- en beveiligingsmechanismen in de betrokken besturingssystemen.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Permission Issues",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "State Issues",
"title": "CWE-371"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
},
{
"category": "general",
"text": "Insertion of Sensitive Information into Log File",
"title": "CWE-532"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/126792"
},
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/126793"
}
],
"title": "Kwetsbaarheden verholpen in Apple iOS en iPadOS",
"tracking": {
"current_release_date": "2026-03-25T14:02:07.392994Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2026-0101",
"initial_release_date": "2026-03-25T14:02:07.392994Z",
"revision_history": [
{
"date": "2026-03-25T14:02:07.392994Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "iPadOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14524",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"notes": [
{
"category": "other",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
},
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "description",
"text": "A vulnerability in libcurl versions 7.33.0 to 8.17.0 causes OAuth2 bearer tokens to be unintentionally leaked during cross-protocol redirects involving IMAP, LDAP, POP3, or SMTP schemes, potentially exposing sensitive information.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-14524 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-14524.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-43376",
"notes": [
{
"category": "description",
"text": "A logic issue affecting state management in multiple Apple OS versions was fixed to prevent remote attackers from viewing leaked DNS queries when Private Relay is enabled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43376 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43376.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2025-43376"
},
{
"cve": "CVE-2025-43534",
"notes": [
{
"category": "description",
"text": "An improved validation fixed a path handling vulnerability in iOS 18.7.7, iPadOS 18.7.7, iOS 26.2, and iPadOS 26.2 that could allow a user with physical access to bypass Activation Lock.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43534 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43534.json"
}
],
"title": "CVE-2025-43534"
},
{
"cve": "CVE-2025-64505",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple vulnerabilities in libpng, including heap buffer overflows and over-reads in functions like png_do_quantize, affect various products including NetApp and Apple software, alongside a separate Oracle MySQL Workbench flaw allowing unauthorized data modification or denial of service.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-64505 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-64505.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2025-64505"
},
{
"cve": "CVE-2026-20657",
"notes": [
{
"category": "description",
"text": "Improved memory handling in iOS 18.7.7, iPadOS 18.7.7, macOS Sequoia 15.7.5, and macOS Sonoma 14.8.5 fixed an issue where parsing a maliciously crafted file could cause unexpected app termination.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20657 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20657.json"
}
],
"title": "CVE-2026-20657"
},
{
"cve": "CVE-2026-20665",
"notes": [
{
"category": "description",
"text": "Apple fixed a vulnerability in multiple operating systems and Safari versions 26.4 and iOS/iPadOS 18.7.7 where malicious web content could bypass Content Security Policy enforcement due to improper state management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20665 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20665.json"
}
],
"title": "CVE-2026-20665"
},
{
"cve": "CVE-2026-20668",
"notes": [
{
"category": "description",
"text": "A logging issue affecting iOS, iPadOS, macOS, and visionOS was fixed by enhancing data redaction to prevent apps from accessing sensitive user information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20668 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20668.json"
}
],
"title": "CVE-2026-20668"
},
{
"cve": "CVE-2026-20687",
"notes": [
{
"category": "description",
"text": "A use after free vulnerability in multiple Apple operating systems was fixed by improving memory management to prevent apps from causing unexpected system termination or writing to kernel memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20687 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20687.json"
}
],
"title": "CVE-2026-20687"
},
{
"cve": "CVE-2026-20688",
"notes": [
{
"category": "description",
"text": "A path handling vulnerability allowing applications to potentially escape their sandbox was fixed through improved validation in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, and visionOS 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20688 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20688.json"
}
],
"title": "CVE-2026-20688"
},
{
"cve": "CVE-2026-20690",
"notes": [
{
"category": "description",
"text": "An out-of-bounds access vulnerability in Apple operating systems was fixed by improving bounds checking to prevent process termination caused by maliciously crafted audio streams.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20690 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20690.json"
}
],
"title": "CVE-2026-20690"
},
{
"cve": "CVE-2026-20691",
"notes": [
{
"category": "description",
"text": "An authorization vulnerability in Safari 26.4 and related OS versions was resolved by enhancing state management to prevent malicious webpages from fingerprinting users.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20691 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20691.json"
}
],
"title": "CVE-2026-20691"
},
{
"cve": "CVE-2026-20692",
"notes": [
{
"category": "description",
"text": "A privacy issue affecting user preferences for mail content handling, specifically the \u0027Hide IP Address\u0027 and \u0027Block All Remote Content\u0027 features, was fixed in iOS 26.4, iPadOS 26.4, and various macOS versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20692 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20692.json"
}
],
"title": "CVE-2026-20692"
},
{
"cve": "CVE-2026-20698",
"notes": [
{
"category": "description",
"text": "A memory handling vulnerability in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4 could allow an app to cause unexpected system termination or kernel memory corruption, which was resolved through improved memory management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20698 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20698.json"
}
],
"title": "CVE-2026-20698"
},
{
"cve": "CVE-2026-28822",
"notes": [
{
"category": "description",
"text": "A type confusion vulnerability related to memory handling in multiple Apple operating systems could allow an attacker to cause unexpected application termination.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28822 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28822.json"
}
],
"title": "CVE-2026-28822"
},
{
"cve": "CVE-2026-28833",
"notes": [
{
"category": "description",
"text": "A permissions issue allowing apps to enumerate a user\u2019s installed applications was fixed by implementing additional restrictions in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28833 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28833.json"
}
],
"title": "CVE-2026-28833"
},
{
"cve": "CVE-2026-28852",
"notes": [
{
"category": "description",
"text": "A stack overflow vulnerability allowing denial-of-service was fixed by improving input validation across multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28852 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28852.json"
}
],
"title": "CVE-2026-28852"
},
{
"cve": "CVE-2026-28856",
"notes": [
{
"category": "description",
"text": "An authentication vulnerability allowing physical attackers to access sensitive user information on locked devices was fixed in iOS 26.4, iPadOS 26.4, visionOS 26.4, and watchOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28856 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28856.json"
}
],
"title": "CVE-2026-28856"
},
{
"cve": "CVE-2026-28857",
"notes": [
{
"category": "description",
"text": "Improved memory handling in Safari 26.4, iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4 fixed an issue where processing maliciously crafted web content could cause unexpected process crashes.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28857 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28857.json"
}
],
"title": "CVE-2026-28857"
},
{
"cve": "CVE-2026-28858",
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability in iOS 26.4 and iPadOS 26.4 was fixed by improved bounds checking to prevent remote system termination or kernel memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28858 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28858.json"
}
],
"title": "CVE-2026-28858"
},
{
"cve": "CVE-2026-28859",
"notes": [
{
"category": "description",
"text": "A memory handling vulnerability in Safari 26.4 and related OS versions was fixed, preventing malicious websites from processing restricted web content outside the sandbox environment.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28859 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28859.json"
}
],
"title": "CVE-2026-28859"
},
{
"cve": "CVE-2026-28861",
"notes": [
{
"category": "description",
"text": "A logic issue in state management was fixed across multiple Apple operating systems to prevent malicious websites from accessing script message handlers intended for other origins.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28861 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28861.json"
}
],
"title": "CVE-2026-28861"
},
{
"cve": "CVE-2026-28863",
"notes": [
{
"category": "description",
"text": "A permissions issue allowing apps to fingerprint users was fixed by adding restrictions in iOS 26.4, iPadOS 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28863 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28863.json"
}
],
"title": "CVE-2026-28863"
},
{
"cve": "CVE-2026-28864",
"notes": [
{
"category": "description",
"text": "Apple addressed a vulnerability in iOS, iPadOS, macOS, visionOS, and watchOS by enhancing permissions checks to prevent local attackers from accessing users\u0027 Keychain items.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28864 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28864.json"
}
],
"title": "CVE-2026-28864"
},
{
"cve": "CVE-2026-28865",
"notes": [
{
"category": "description",
"text": "An authentication vulnerability in multiple Apple operating systems was addressed by improving state management to prevent attackers in privileged network positions from intercepting network traffic.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28865 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28865.json"
}
],
"title": "CVE-2026-28865"
},
{
"cve": "CVE-2026-28866",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems including iOS 18.7.7, iPadOS 18.7.7, iOS 26.4, iPadOS 26.4, and various macOS versions addressed a vulnerability where improper symlink validation allowed apps to access sensitive user data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28866 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28866.json"
}
],
"title": "CVE-2026-28866"
},
{
"cve": "CVE-2026-28867",
"notes": [
{
"category": "description",
"text": "A vulnerability allowing apps to potentially leak sensitive kernel state was fixed through improved authentication in multiple Apple operating systems including iOS 18.7.7, iPadOS 18.7.7, and macOS Sequoia 15.7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28867 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28867.json"
}
],
"title": "CVE-2026-28867"
},
{
"cve": "CVE-2026-28868",
"notes": [
{
"category": "description",
"text": "A logging issue in multiple Apple operating systems including iOS, iPadOS, macOS, visionOS, and watchOS was fixed by improving data redaction to prevent apps from disclosing kernel memory.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28868 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28868.json"
}
],
"title": "CVE-2026-28868"
},
{
"cve": "CVE-2026-28870",
"notes": [
{
"category": "description",
"text": "An information leakage vulnerability allowing unauthorized access to sensitive user data was fixed through additional validation in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28870 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28870.json"
}
],
"title": "CVE-2026-28870"
},
{
"cve": "CVE-2026-28871",
"notes": [
{
"category": "description",
"text": "A logic issue in Safari, iOS, iPadOS, and macOS was fixed through improved checks to prevent cross-site scripting attacks from malicious websites.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28871 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28871.json"
}
],
"title": "CVE-2026-28871"
},
{
"cve": "CVE-2026-28874",
"notes": [
{
"category": "description",
"text": "iOS 26.4 and iPadOS 26.4 addressed an issue where improved validation checks prevent remote attackers from causing unexpected app termination.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28874 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28874.json"
}
],
"title": "CVE-2026-28874"
},
{
"cve": "CVE-2026-28875",
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability in iOS 26.4 and iPadOS 26.4 was fixed by implementing improved bounds checking to prevent remote denial-of-service attacks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28875 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28875.json"
}
],
"title": "CVE-2026-28875"
},
{
"cve": "CVE-2026-28876",
"notes": [
{
"category": "description",
"text": "A parsing issue in directory path handling was fixed by improving path validation across multiple OS versions to prevent unauthorized app access to sensitive user data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28876 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28876.json"
}
],
"title": "CVE-2026-28876"
},
{
"cve": "CVE-2026-28877",
"notes": [
{
"category": "description",
"text": "An authorization vulnerability allowing apps to potentially access sensitive user data was resolved by enhancing state management in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, visionOS 26.4, and watchOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28877 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28877.json"
}
],
"title": "CVE-2026-28877"
},
{
"cve": "CVE-2026-28878",
"notes": [
{
"category": "description",
"text": "Apple addressed a privacy vulnerability that allowed apps to enumerate installed applications by removing sensitive data in updates to iOS 18.7.7, iPadOS 18.7.7, macOS Sonoma 14.8.5, and other operating systems.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28878 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28878.json"
}
],
"title": "CVE-2026-28878"
},
{
"cve": "CVE-2026-28879",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability causing potential process crashes when handling malicious web content was fixed through improved memory management in multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28879 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28879.json"
}
],
"title": "CVE-2026-28879"
},
{
"cve": "CVE-2026-28880",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems including iOS, iPadOS, macOS, and visionOS addressed a permissions issue by implementing additional restrictions to prevent apps from enumerating a user\u2019s installed applications.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28880 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28880.json"
}
],
"title": "CVE-2026-28880"
},
{
"cve": "CVE-2026-28882",
"notes": [
{
"category": "description",
"text": "An issue allowing apps to enumerate a user\u0027s installed applications was resolved through enhanced verification mechanisms in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28882 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28882.json"
}
],
"title": "CVE-2026-28882"
},
{
"cve": "CVE-2026-28886",
"notes": [
{
"category": "description",
"text": "A null pointer dereference vulnerability allowing a privileged network user to cause denial-of-service was fixed via improved input validation in multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28886 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28886.json"
}
],
"title": "CVE-2026-28886"
},
{
"cve": "CVE-2026-28894",
"notes": [
{
"category": "description",
"text": "A denial-of-service vulnerability in iOS 26.4, iPadOS 26.4, and multiple macOS versions was addressed by improved input validation to prevent remote attackers from causing service disruptions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28894 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28894.json"
}
],
"title": "CVE-2026-28894"
},
{
"cve": "CVE-2026-28895",
"notes": [
{
"category": "description",
"text": "iOS and iPadOS 16.4 fixed a vulnerability allowing attackers with physical access to bypass biometrics-gated Protected Apps by using the passcode on devices with Stolen Device Protection enabled through improved verification checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28895 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28895.json"
}
],
"title": "CVE-2026-28895"
}
]
}
NCSC-2026-0102
Vulnerability from csaf_ncscnl - Published: 2026-03-25 14:15 - Updated: 2026-03-25 14:15A vulnerability in libcurl versions 7.33.0 to 8.17.0 causes OAuth2 bearer tokens to be unintentionally leaked during cross-protocol redirects involving IMAP, LDAP, POP3, or SMTP schemes, potentially exposing sensitive information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
Multiple vulnerabilities affect Oracle Communications Unified Assurance and Apache HTTP Server, including critical data compromise, denial of service, and issues in mod_md (ACME) components across various versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
Multiple vulnerabilities affect Oracle Communications Unified Assurance (6.1.0-6.1.1) and Apache HTTP Server (pre-2.4.66), including issues with Server Side Includes, mod_cgid, mod_md, and mod_userdir+suexec, leading to data compromise, denial of service, and information disclosure.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
Multiple vulnerabilities affect Oracle Secure Backup and Apache HTTP Server, including unauthorized data modification, SSRF leading to NTLM hash leakage, and sensitive information disclosure across various versions and configurations.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
Multiple vulnerabilities in libpng, including heap buffer overflows and over-reads in functions like png_do_quantize, affect various products including NetApp and Apple software, alongside a separate Oracle MySQL Workbench flaw allowing unauthorized data modification or denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
Multiple vulnerabilities affect Oracle Communications Unified Assurance (6.1.0-6.1.1) and Apache HTTP Server (2.4.0-2.4.65), including CGI environment variable overrides, improper neutralization of environment variables, and other security issues leading to data compromise and denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
Multiple vulnerabilities affect Oracle Communications Unified Assurance (6.1.0-6.1.1) and Apache HTTP Server (2.4.7-2.4.65), including privilege escalation, mod_userdir+suexec bypass, and information disclosure issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 addressed a permissions issue by implementing additional restrictions to prevent apps from accessing protected user data.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An elevation of privilege vulnerability in macOS Tahoe 26.4 was addressed by implementing enhanced logic checks to prevent unauthorized privilege escalation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
macOS Tahoe 26.4 fixed a parsing vulnerability in directory path handling that previously allowed applications to access sensitive user data by enhancing path validation mechanisms.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
macOS versions Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 fixed a security issue involving symlink handling that previously allowed apps to access user-sensitive data.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A use after free vulnerability causing unexpected system termination was fixed by improving memory management across multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An integer overflow vulnerability causing potential heap corruption from processing maliciously crafted strings was fixed in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.3 by improving input validation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
Multiple Apple OS updates including Safari, iOS, iPadOS, and macOS addressed a cross-origin vulnerability in the Navigation API by improving input validation to prevent bypassing the Same Origin Policy.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A privacy vulnerability related to temporary file handling that allowed unauthorized app access to sensitive user data was resolved in macOS Sequoia 15.7.5, macOS Sonoma 14.8.4, and macOS Tahoe 26.3.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
Improved memory handling in iOS 18.7.7, iPadOS 18.7.7, macOS Sequoia 15.7.5, and macOS Sonoma 14.8.5 fixed an issue where parsing a maliciously crafted file could cause unexpected app termination.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A path handling vulnerability allowing remote users to write arbitrary files was fixed in multiple Apple operating systems and Safari versions through improved logic preventing unauthorized file writes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
Improved memory handling in Safari 26.4, iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4 fixed an issue where processing maliciously crafted web content could cause unexpected process crashes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
Apple fixed a vulnerability in multiple operating systems and Safari versions 26.4 and iOS/iPadOS 18.7.7 where malicious web content could bypass Content Security Policy enforcement due to improper state management.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A logging issue affecting iOS, iPadOS, macOS, and visionOS was fixed by enhancing data redaction to prevent apps from accessing sensitive user information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A permissions issue in macOS Tahoe 26.4 was fixed by implementing additional restrictions to prevent an app from bypassing Gatekeeper security checks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A use after free vulnerability in multiple Apple operating systems was fixed by improving memory management to prevent apps from causing unexpected system termination or writing to kernel memory.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A path handling vulnerability allowing applications to potentially escape their sandbox was fixed through improved validation in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, and visionOS 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An out-of-bounds access vulnerability in Apple operating systems was fixed by improving bounds checking to prevent process termination caused by maliciously crafted audio streams.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An authorization vulnerability in Safari 26.4 and related OS versions was resolved by enhancing state management to prevent malicious webpages from fingerprinting users.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A privacy issue affecting user preferences for mail content handling, specifically the 'Hide IP Address' and 'Block All Remote Content' features, was fixed in iOS 26.4, iPadOS 26.4, and various macOS versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An issue allowing an attacker with root privileges to delete protected system files was resolved through improved state management in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
Multiple versions of iOS, iPadOS, and macOS addressed a vulnerability involving improper handling of symlinks that could allow an app to access user-sensitive data.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An information disclosure vulnerability allowing applications to determine kernel memory layout was fixed by improving memory management in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 addressed a permissions issue by implementing additional restrictions to prevent apps from accessing sensitive user data.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A memory handling vulnerability in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4 could allow an app to cause unexpected system termination or kernel memory corruption, which was resolved through improved memory management.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A downgrade vulnerability on Intel-based Macs allowing potential access to user-sensitive data was mitigated by enhanced code-signing restrictions in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.3/26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 addressed an access issue by implementing additional sandbox restrictions to prevent apps from connecting to network shares without user consent.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A path handling vulnerability allowing unauthorized file deletion was fixed through improved validation in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A race condition vulnerability allowing sandboxed processes to bypass restrictions was fixed by improving state handling in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A logging issue allowing apps to access sensitive user data was fixed through improved data redaction in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
macOS Tahoe 26.4 addressed a security issue by implementing enhanced validation checks to prevent unauthorized app access to sensitive user data.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A validation issue in entitlement verification that could allow an app to gain elevated privileges was fixed in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 through improved process entitlement validation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A type confusion vulnerability related to memory handling in multiple Apple operating systems could allow an attacker to cause unexpected application termination.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A path handling vulnerability in macOS Tahoe 26.4 allowed applications with root privileges to delete protected system files, which was resolved through improved validation mechanisms.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An authorization vulnerability allowing applications to access sensitive user data was resolved by enhancing state management in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An out-of-bounds write vulnerability allowing applications to modify protected file system areas was fixed by improving bounds checking in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A logic flaw in macOS Tahoe 26.4 allowed a malicious application to escape its sandbox, which was addressed by implementing enhanced sandbox restrictions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A parsing vulnerability in directory path handling that could allow an application to escape its sandbox was fixed through enhanced path validation in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A permissions vulnerability allowing applications to access sensitive user data was fixed by removing the vulnerable code in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 addressed a permissions issue by implementing additional restrictions to prevent applications from modifying protected parts of the file system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An authorization vulnerability allowing applications to access sensitive user data was resolved by enhancing state management in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An out-of-bounds read vulnerability in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 was fixed by improving bounds checking to prevent potential kernel memory disclosure by applications.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A permissions issue allowing apps to enumerate a user’s installed applications was fixed by implementing additional restrictions in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A race condition causing potential unexpected system termination was fixed in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 by improving state handling to address the issue.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A use-after-free vulnerability in SMB network share mounting was fixed in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4, addressing a memory management flaw that could cause system termination.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
macOS Tahoe 26.4 addressed a logic flaw that previously allowed applications to improperly access sensitive user data by implementing enhanced validation checks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A permissions issue allowing an app to potentially escape its sandbox was fixed by implementing additional sandbox restrictions in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An issue allowing applications to access sensitive user data was resolved through enhanced verification mechanisms in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A buffer overflow vulnerability in macOS Tahoe 26.4 was addressed by enhancing size validation to prevent potential memory corruption and application crashes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
The buffer overflow vulnerability causing memory corruption and application termination was addressed in macOS Tahoe 26.4 through enhanced bounds checking.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An input validation vulnerability in macOS Tahoe 26.4 was addressed, preventing unauthorized access to the file system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An authorization vulnerability in macOS Tahoe 26.4 was addressed by enhancing state management to prevent unauthorized access to protected user data.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A stack overflow vulnerability allowing denial-of-service was fixed by improving input validation across multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
Improved memory handling in Safari 26.4, iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4 fixed an issue where processing maliciously crafted web content could cause unexpected process crashes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A memory handling vulnerability in Safari 26.4 and related OS versions was fixed, preventing malicious websites from processing restricted web content outside the sandbox environment.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A logic issue in state management was fixed across multiple Apple operating systems to prevent malicious websites from accessing script message handlers intended for other origins.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
macOS updates Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 enhance private data redaction in log entries to prevent applications from accessing sensitive user information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
Apple addressed a vulnerability in iOS, iPadOS, macOS, visionOS, and watchOS by enhancing permissions checks to prevent local attackers from accessing users' Keychain items.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An authentication vulnerability in multiple Apple operating systems was addressed by improving state management to prevent attackers in privileged network positions from intercepting network traffic.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
Multiple Apple operating systems including iOS 18.7.7, iPadOS 18.7.7, iOS 26.4, iPadOS 26.4, and various macOS versions addressed a vulnerability where improper symlink validation allowed apps to access sensitive user data.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A vulnerability allowing apps to potentially leak sensitive kernel state was fixed through improved authentication in multiple Apple operating systems including iOS 18.7.7, iPadOS 18.7.7, and macOS Sequoia 15.7.5.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A logging issue in multiple Apple operating systems including iOS, iPadOS, macOS, visionOS, and watchOS was fixed by improving data redaction to prevent apps from disclosing kernel memory.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An information leakage vulnerability allowing unauthorized access to sensitive user data was fixed through additional validation in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A logic issue in Safari, iOS, iPadOS, and macOS was fixed through improved checks to prevent cross-site scripting attacks from malicious websites.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A parsing issue in directory path handling was fixed by improving path validation across multiple OS versions to prevent unauthorized app access to sensitive user data.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An authorization vulnerability allowing apps to potentially access sensitive user data was resolved by enhancing state management in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, visionOS 26.4, and watchOS 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
Apple addressed a privacy vulnerability that allowed apps to enumerate installed applications by removing sensitive data in updates to iOS 18.7.7, iPadOS 18.7.7, macOS Sonoma 14.8.5, and other operating systems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A use-after-free vulnerability causing potential process crashes when handling malicious web content was fixed through improved memory management in multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
Multiple Apple operating systems including iOS, iPadOS, macOS, and visionOS addressed a permissions issue by implementing additional restrictions to prevent apps from enumerating a user’s installed applications.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
macOS Tahoe 26.4 fixed a privacy vulnerability by relocating sensitive user data to prevent unauthorized app access.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
An issue allowing apps to enumerate a user's installed applications was resolved through enhanced verification mechanisms in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A null pointer dereference vulnerability allowing a privileged network user to cause denial-of-service was fixed via improved input validation in multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A race condition vulnerability allowing an application to potentially gain root privileges was fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4 by improving state handling.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A race condition vulnerability allowing an application to potentially escape its sandbox was fixed through additional validation in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A permissions vulnerability allowing applications to modify protected file system areas was fixed by removing vulnerable code in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A privacy vulnerability involving the handling of temporary files during print preview was addressed in the macOS Tahoe 26.4 update.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
A denial-of-service vulnerability in iOS 26.4, iPadOS 26.4, and multiple macOS versions was addressed by improved input validation to prevent remote attackers from causing service disruptions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / Mac OS
|
vers:unknown/* |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Apple heeft meerdere kwetsbaarheden verholpen in macOS (Specifiek voor Sequoia 15.7.5, Sonoma 14.8.5, en Tahoe 26.4).",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden omvatten verschillende problemen zoals onvoldoende validatie van invoer, onjuiste afhandeling van geheugen, en problemen met machtigingen die konden leiden tot ongeautoriseerde toegang tot gevoelige gebruikersdata. Aanvallers kunnen deze kwetsbaarheden misbruiken om toegang te krijgen tot beschermde systeembestanden, gegevens te wijzigen, of zelfs de stabiliteit van het systeem in gevaar te brengen. De kwetsbaarheden zijn opgelost door verbeterde validatie- en beveiligingsmechanismen in de betrokken macOS-versies.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Privilege Issues",
"title": "CWE-265"
},
{
"category": "general",
"text": "Permission Issues",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "general",
"text": "Authentication Bypass by Primary Weakness",
"title": "CWE-305"
},
{
"category": "general",
"text": "Origin Validation Error",
"title": "CWE-346"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "State Issues",
"title": "CWE-371"
},
{
"category": "general",
"text": "Insecure Temporary File",
"title": "CWE-377"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
},
{
"category": "general",
"text": "Insertion of Sensitive Information into Log File",
"title": "CWE-532"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Permissive Cross-domain Security Policy with Untrusted Domains",
"title": "CWE-942"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/126794"
},
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/126795"
},
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/126796"
}
],
"title": "Kwetsbaarheden verholpen in Apple macOS",
"tracking": {
"current_release_date": "2026-03-25T14:15:56.073353Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2026-0102",
"initial_release_date": "2026-03-25T14:15:56.073353Z",
"revision_history": [
{
"date": "2026-03-25T14:15:56.073353Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Mac OS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14524",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"notes": [
{
"category": "other",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
},
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "description",
"text": "A vulnerability in libcurl versions 7.33.0 to 8.17.0 causes OAuth2 bearer tokens to be unintentionally leaked during cross-protocol redirects involving IMAP, LDAP, POP3, or SMTP schemes, potentially exposing sensitive information.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-14524 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-14524.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-55753",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "Multiple vulnerabilities affect Oracle Communications Unified Assurance and Apache HTTP Server, including critical data compromise, denial of service, and issues in mod_md (ACME) components across various versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55753 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55753.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-55753"
},
{
"cve": "CVE-2025-58098",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "description",
"text": "Multiple vulnerabilities affect Oracle Communications Unified Assurance (6.1.0-6.1.1) and Apache HTTP Server (pre-2.4.66), including issues with Server Side Includes, mod_cgid, mod_md, and mod_userdir+suexec, leading to data compromise, denial of service, and information disclosure.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-58098 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58098.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-58098"
},
{
"cve": "CVE-2025-59775",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "description",
"text": "Multiple vulnerabilities affect Oracle Secure Backup and Apache HTTP Server, including unauthorized data modification, SSRF leading to NTLM hash leakage, and sensitive information disclosure across various versions and configurations.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-59775 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59775.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-59775"
},
{
"cve": "CVE-2025-64505",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple vulnerabilities in libpng, including heap buffer overflows and over-reads in functions like png_do_quantize, affect various products including NetApp and Apple software, alongside a separate Oracle MySQL Workbench flaw allowing unauthorized data modification or denial of service.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-64505 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-64505.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-64505"
},
{
"cve": "CVE-2025-65082",
"cwe": {
"id": "CWE-150",
"name": "Improper Neutralization of Escape, Meta, or Control Sequences"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "description",
"text": "Multiple vulnerabilities affect Oracle Communications Unified Assurance (6.1.0-6.1.1) and Apache HTTP Server (2.4.0-2.4.65), including CGI environment variable overrides, improper neutralization of environment variables, and other security issues leading to data compromise and denial of service.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-65082 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-65082.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-65082"
},
{
"cve": "CVE-2025-66200",
"cwe": {
"id": "CWE-288",
"name": "Authentication Bypass Using an Alternate Path or Channel"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "other",
"text": "Authentication Bypass by Primary Weakness",
"title": "CWE-305"
},
{
"category": "description",
"text": "Multiple vulnerabilities affect Oracle Communications Unified Assurance (6.1.0-6.1.1) and Apache HTTP Server (2.4.7-2.4.65), including privilege escalation, mod_userdir+suexec bypass, and information disclosure issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-66200 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-66200.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-66200"
},
{
"cve": "CVE-2026-20607",
"notes": [
{
"category": "description",
"text": "macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 addressed a permissions issue by implementing additional restrictions to prevent apps from accessing protected user data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20607 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20607.json"
}
],
"title": "CVE-2026-20607"
},
{
"cve": "CVE-2026-20631",
"notes": [
{
"category": "description",
"text": "An elevation of privilege vulnerability in macOS Tahoe 26.4 was addressed by implementing enhanced logic checks to prevent unauthorized privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20631 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20631.json"
}
],
"title": "CVE-2026-20631"
},
{
"cve": "CVE-2026-20632",
"notes": [
{
"category": "description",
"text": "macOS Tahoe 26.4 fixed a parsing vulnerability in directory path handling that previously allowed applications to access sensitive user data by enhancing path validation mechanisms.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20632 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20632.json"
}
],
"title": "CVE-2026-20632"
},
{
"cve": "CVE-2026-20633",
"notes": [
{
"category": "description",
"text": "macOS versions Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 fixed a security issue involving symlink handling that previously allowed apps to access user-sensitive data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20633 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20633.json"
}
],
"title": "CVE-2026-20633"
},
{
"cve": "CVE-2026-20637",
"notes": [
{
"category": "description",
"text": "A use after free vulnerability causing unexpected system termination was fixed by improving memory management across multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20637 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20637.json"
}
],
"title": "CVE-2026-20637"
},
{
"cve": "CVE-2026-20639",
"notes": [
{
"category": "description",
"text": "An integer overflow vulnerability causing potential heap corruption from processing maliciously crafted strings was fixed in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.3 by improving input validation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20639 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20639.json"
}
],
"title": "CVE-2026-20639"
},
{
"cve": "CVE-2026-20643",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"notes": [
{
"category": "other",
"text": "Origin Validation Error",
"title": "CWE-346"
},
{
"category": "description",
"text": "Multiple Apple OS updates including Safari, iOS, iPadOS, and macOS addressed a cross-origin vulnerability in the Navigation API by improving input validation to prevent bypassing the Same Origin Policy.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20643 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20643.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-20643"
},
{
"cve": "CVE-2026-20651",
"notes": [
{
"category": "description",
"text": "A privacy vulnerability related to temporary file handling that allowed unauthorized app access to sensitive user data was resolved in macOS Sequoia 15.7.5, macOS Sonoma 14.8.4, and macOS Tahoe 26.3.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20651 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20651.json"
}
],
"title": "CVE-2026-20651"
},
{
"cve": "CVE-2026-20657",
"notes": [
{
"category": "description",
"text": "Improved memory handling in iOS 18.7.7, iPadOS 18.7.7, macOS Sequoia 15.7.5, and macOS Sonoma 14.8.5 fixed an issue where parsing a maliciously crafted file could cause unexpected app termination.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20657 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20657.json"
}
],
"title": "CVE-2026-20657"
},
{
"cve": "CVE-2026-20660",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "description",
"text": "A path handling vulnerability allowing remote users to write arbitrary files was fixed in multiple Apple operating systems and Safari versions through improved logic preventing unauthorized file writes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20660 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20660.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-20660"
},
{
"cve": "CVE-2026-20664",
"notes": [
{
"category": "description",
"text": "Improved memory handling in Safari 26.4, iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4 fixed an issue where processing maliciously crafted web content could cause unexpected process crashes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20664 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20664.json"
}
],
"title": "CVE-2026-20664"
},
{
"cve": "CVE-2026-20665",
"notes": [
{
"category": "description",
"text": "Apple fixed a vulnerability in multiple operating systems and Safari versions 26.4 and iOS/iPadOS 18.7.7 where malicious web content could bypass Content Security Policy enforcement due to improper state management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20665 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20665.json"
}
],
"title": "CVE-2026-20665"
},
{
"cve": "CVE-2026-20668",
"notes": [
{
"category": "description",
"text": "A logging issue affecting iOS, iPadOS, macOS, and visionOS was fixed by enhancing data redaction to prevent apps from accessing sensitive user information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20668 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20668.json"
}
],
"title": "CVE-2026-20668"
},
{
"cve": "CVE-2026-20684",
"notes": [
{
"category": "description",
"text": "A permissions issue in macOS Tahoe 26.4 was fixed by implementing additional restrictions to prevent an app from bypassing Gatekeeper security checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20684 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20684.json"
}
],
"title": "CVE-2026-20684"
},
{
"cve": "CVE-2026-20687",
"notes": [
{
"category": "description",
"text": "A use after free vulnerability in multiple Apple operating systems was fixed by improving memory management to prevent apps from causing unexpected system termination or writing to kernel memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20687 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20687.json"
}
],
"title": "CVE-2026-20687"
},
{
"cve": "CVE-2026-20688",
"notes": [
{
"category": "description",
"text": "A path handling vulnerability allowing applications to potentially escape their sandbox was fixed through improved validation in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, and visionOS 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20688 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20688.json"
}
],
"title": "CVE-2026-20688"
},
{
"cve": "CVE-2026-20690",
"notes": [
{
"category": "description",
"text": "An out-of-bounds access vulnerability in Apple operating systems was fixed by improving bounds checking to prevent process termination caused by maliciously crafted audio streams.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20690 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20690.json"
}
],
"title": "CVE-2026-20690"
},
{
"cve": "CVE-2026-20691",
"notes": [
{
"category": "description",
"text": "An authorization vulnerability in Safari 26.4 and related OS versions was resolved by enhancing state management to prevent malicious webpages from fingerprinting users.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20691 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20691.json"
}
],
"title": "CVE-2026-20691"
},
{
"cve": "CVE-2026-20692",
"notes": [
{
"category": "description",
"text": "A privacy issue affecting user preferences for mail content handling, specifically the \u0027Hide IP Address\u0027 and \u0027Block All Remote Content\u0027 features, was fixed in iOS 26.4, iPadOS 26.4, and various macOS versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20692 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20692.json"
}
],
"title": "CVE-2026-20692"
},
{
"cve": "CVE-2026-20693",
"notes": [
{
"category": "description",
"text": "An issue allowing an attacker with root privileges to delete protected system files was resolved through improved state management in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20693 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20693.json"
}
],
"title": "CVE-2026-20693"
},
{
"cve": "CVE-2026-20694",
"notes": [
{
"category": "description",
"text": "Multiple versions of iOS, iPadOS, and macOS addressed a vulnerability involving improper handling of symlinks that could allow an app to access user-sensitive data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20694 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20694.json"
}
],
"title": "CVE-2026-20694"
},
{
"cve": "CVE-2026-20695",
"notes": [
{
"category": "description",
"text": "An information disclosure vulnerability allowing applications to determine kernel memory layout was fixed by improving memory management in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20695 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20695.json"
}
],
"title": "CVE-2026-20695"
},
{
"cve": "CVE-2026-20697",
"notes": [
{
"category": "description",
"text": "macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 addressed a permissions issue by implementing additional restrictions to prevent apps from accessing sensitive user data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20697 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20697.json"
}
],
"title": "CVE-2026-20697"
},
{
"cve": "CVE-2026-20698",
"notes": [
{
"category": "description",
"text": "A memory handling vulnerability in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4 could allow an app to cause unexpected system termination or kernel memory corruption, which was resolved through improved memory management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20698 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20698.json"
}
],
"title": "CVE-2026-20698"
},
{
"cve": "CVE-2026-20699",
"notes": [
{
"category": "description",
"text": "A downgrade vulnerability on Intel-based Macs allowing potential access to user-sensitive data was mitigated by enhanced code-signing restrictions in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.3/26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20699 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20699.json"
}
],
"title": "CVE-2026-20699"
},
{
"cve": "CVE-2026-20701",
"notes": [
{
"category": "description",
"text": "macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 addressed an access issue by implementing additional sandbox restrictions to prevent apps from connecting to network shares without user consent.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20701 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20701.json"
}
],
"title": "CVE-2026-20701"
},
{
"cve": "CVE-2026-28816",
"notes": [
{
"category": "description",
"text": "A path handling vulnerability allowing unauthorized file deletion was fixed through improved validation in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28816 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28816.json"
}
],
"title": "CVE-2026-28816"
},
{
"cve": "CVE-2026-28817",
"notes": [
{
"category": "description",
"text": "A race condition vulnerability allowing sandboxed processes to bypass restrictions was fixed by improving state handling in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28817 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28817.json"
}
],
"title": "CVE-2026-28817"
},
{
"cve": "CVE-2026-28818",
"notes": [
{
"category": "description",
"text": "A logging issue allowing apps to access sensitive user data was fixed through improved data redaction in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28818 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28818.json"
}
],
"title": "CVE-2026-28818"
},
{
"cve": "CVE-2026-28820",
"notes": [
{
"category": "description",
"text": "macOS Tahoe 26.4 addressed a security issue by implementing enhanced validation checks to prevent unauthorized app access to sensitive user data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28820 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28820.json"
}
],
"title": "CVE-2026-28820"
},
{
"cve": "CVE-2026-28821",
"notes": [
{
"category": "description",
"text": "A validation issue in entitlement verification that could allow an app to gain elevated privileges was fixed in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 through improved process entitlement validation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28821 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28821.json"
}
],
"title": "CVE-2026-28821"
},
{
"cve": "CVE-2026-28822",
"notes": [
{
"category": "description",
"text": "A type confusion vulnerability related to memory handling in multiple Apple operating systems could allow an attacker to cause unexpected application termination.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28822 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28822.json"
}
],
"title": "CVE-2026-28822"
},
{
"cve": "CVE-2026-28823",
"notes": [
{
"category": "description",
"text": "A path handling vulnerability in macOS Tahoe 26.4 allowed applications with root privileges to delete protected system files, which was resolved through improved validation mechanisms.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28823 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28823.json"
}
],
"title": "CVE-2026-28823"
},
{
"cve": "CVE-2026-28824",
"notes": [
{
"category": "description",
"text": "An authorization vulnerability allowing applications to access sensitive user data was resolved by enhancing state management in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28824 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28824.json"
}
],
"title": "CVE-2026-28824"
},
{
"cve": "CVE-2026-28825",
"notes": [
{
"category": "description",
"text": "An out-of-bounds write vulnerability allowing applications to modify protected file system areas was fixed by improving bounds checking in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28825 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28825.json"
}
],
"title": "CVE-2026-28825"
},
{
"cve": "CVE-2026-28826",
"notes": [
{
"category": "description",
"text": "A logic flaw in macOS Tahoe 26.4 allowed a malicious application to escape its sandbox, which was addressed by implementing enhanced sandbox restrictions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28826 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28826.json"
}
],
"title": "CVE-2026-28826"
},
{
"cve": "CVE-2026-28827",
"notes": [
{
"category": "description",
"text": "A parsing vulnerability in directory path handling that could allow an application to escape its sandbox was fixed through enhanced path validation in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28827 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28827.json"
}
],
"title": "CVE-2026-28827"
},
{
"cve": "CVE-2026-28828",
"notes": [
{
"category": "description",
"text": "A permissions vulnerability allowing applications to access sensitive user data was fixed by removing the vulnerable code in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28828 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28828.json"
}
],
"title": "CVE-2026-28828"
},
{
"cve": "CVE-2026-28829",
"notes": [
{
"category": "description",
"text": "macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 addressed a permissions issue by implementing additional restrictions to prevent applications from modifying protected parts of the file system.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28829 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28829.json"
}
],
"title": "CVE-2026-28829"
},
{
"cve": "CVE-2026-28831",
"notes": [
{
"category": "description",
"text": "An authorization vulnerability allowing applications to access sensitive user data was resolved by enhancing state management in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28831 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28831.json"
}
],
"title": "CVE-2026-28831"
},
{
"cve": "CVE-2026-28832",
"notes": [
{
"category": "description",
"text": "An out-of-bounds read vulnerability in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 was fixed by improving bounds checking to prevent potential kernel memory disclosure by applications.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28832 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28832.json"
}
],
"title": "CVE-2026-28832"
},
{
"cve": "CVE-2026-28833",
"notes": [
{
"category": "description",
"text": "A permissions issue allowing apps to enumerate a user\u2019s installed applications was fixed by implementing additional restrictions in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28833 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28833.json"
}
],
"title": "CVE-2026-28833"
},
{
"cve": "CVE-2026-28834",
"notes": [
{
"category": "description",
"text": "A race condition causing potential unexpected system termination was fixed in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 by improving state handling to address the issue.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28834 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28834.json"
}
],
"title": "CVE-2026-28834"
},
{
"cve": "CVE-2026-28835",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in SMB network share mounting was fixed in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4, addressing a memory management flaw that could cause system termination.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28835 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28835.json"
}
],
"title": "CVE-2026-28835"
},
{
"cve": "CVE-2026-28837",
"notes": [
{
"category": "description",
"text": "macOS Tahoe 26.4 addressed a logic flaw that previously allowed applications to improperly access sensitive user data by implementing enhanced validation checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28837 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28837.json"
}
],
"title": "CVE-2026-28837"
},
{
"cve": "CVE-2026-28838",
"notes": [
{
"category": "description",
"text": "A permissions issue allowing an app to potentially escape its sandbox was fixed by implementing additional sandbox restrictions in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28838 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28838.json"
}
],
"title": "CVE-2026-28838"
},
{
"cve": "CVE-2026-28839",
"notes": [
{
"category": "description",
"text": "An issue allowing applications to access sensitive user data was resolved through enhanced verification mechanisms in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28839 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28839.json"
}
],
"title": "CVE-2026-28839"
},
{
"cve": "CVE-2026-28841",
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability in macOS Tahoe 26.4 was addressed by enhancing size validation to prevent potential memory corruption and application crashes.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28841 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28841.json"
}
],
"title": "CVE-2026-28841"
},
{
"cve": "CVE-2026-28842",
"notes": [
{
"category": "description",
"text": "The buffer overflow vulnerability causing memory corruption and application termination was addressed in macOS Tahoe 26.4 through enhanced bounds checking.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28842 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28842.json"
}
],
"title": "CVE-2026-28842"
},
{
"cve": "CVE-2026-28844",
"notes": [
{
"category": "description",
"text": "An input validation vulnerability in macOS Tahoe 26.4 was addressed, preventing unauthorized access to the file system.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28844 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28844.json"
}
],
"title": "CVE-2026-28844"
},
{
"cve": "CVE-2026-28845",
"notes": [
{
"category": "description",
"text": "An authorization vulnerability in macOS Tahoe 26.4 was addressed by enhancing state management to prevent unauthorized access to protected user data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28845 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28845.json"
}
],
"title": "CVE-2026-28845"
},
{
"cve": "CVE-2026-28852",
"notes": [
{
"category": "description",
"text": "A stack overflow vulnerability allowing denial-of-service was fixed by improving input validation across multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28852 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28852.json"
}
],
"title": "CVE-2026-28852"
},
{
"cve": "CVE-2026-28857",
"notes": [
{
"category": "description",
"text": "Improved memory handling in Safari 26.4, iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4 fixed an issue where processing maliciously crafted web content could cause unexpected process crashes.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28857 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28857.json"
}
],
"title": "CVE-2026-28857"
},
{
"cve": "CVE-2026-28859",
"notes": [
{
"category": "description",
"text": "A memory handling vulnerability in Safari 26.4 and related OS versions was fixed, preventing malicious websites from processing restricted web content outside the sandbox environment.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28859 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28859.json"
}
],
"title": "CVE-2026-28859"
},
{
"cve": "CVE-2026-28861",
"notes": [
{
"category": "description",
"text": "A logic issue in state management was fixed across multiple Apple operating systems to prevent malicious websites from accessing script message handlers intended for other origins.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28861 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28861.json"
}
],
"title": "CVE-2026-28861"
},
{
"cve": "CVE-2026-28862",
"notes": [
{
"category": "description",
"text": "macOS updates Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 enhance private data redaction in log entries to prevent applications from accessing sensitive user information.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28862 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28862.json"
}
],
"title": "CVE-2026-28862"
},
{
"cve": "CVE-2026-28864",
"notes": [
{
"category": "description",
"text": "Apple addressed a vulnerability in iOS, iPadOS, macOS, visionOS, and watchOS by enhancing permissions checks to prevent local attackers from accessing users\u0027 Keychain items.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28864 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28864.json"
}
],
"title": "CVE-2026-28864"
},
{
"cve": "CVE-2026-28865",
"notes": [
{
"category": "description",
"text": "An authentication vulnerability in multiple Apple operating systems was addressed by improving state management to prevent attackers in privileged network positions from intercepting network traffic.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28865 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28865.json"
}
],
"title": "CVE-2026-28865"
},
{
"cve": "CVE-2026-28866",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems including iOS 18.7.7, iPadOS 18.7.7, iOS 26.4, iPadOS 26.4, and various macOS versions addressed a vulnerability where improper symlink validation allowed apps to access sensitive user data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28866 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28866.json"
}
],
"title": "CVE-2026-28866"
},
{
"cve": "CVE-2026-28867",
"notes": [
{
"category": "description",
"text": "A vulnerability allowing apps to potentially leak sensitive kernel state was fixed through improved authentication in multiple Apple operating systems including iOS 18.7.7, iPadOS 18.7.7, and macOS Sequoia 15.7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28867 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28867.json"
}
],
"title": "CVE-2026-28867"
},
{
"cve": "CVE-2026-28868",
"notes": [
{
"category": "description",
"text": "A logging issue in multiple Apple operating systems including iOS, iPadOS, macOS, visionOS, and watchOS was fixed by improving data redaction to prevent apps from disclosing kernel memory.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28868 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28868.json"
}
],
"title": "CVE-2026-28868"
},
{
"cve": "CVE-2026-28870",
"notes": [
{
"category": "description",
"text": "An information leakage vulnerability allowing unauthorized access to sensitive user data was fixed through additional validation in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28870 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28870.json"
}
],
"title": "CVE-2026-28870"
},
{
"cve": "CVE-2026-28871",
"notes": [
{
"category": "description",
"text": "A logic issue in Safari, iOS, iPadOS, and macOS was fixed through improved checks to prevent cross-site scripting attacks from malicious websites.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28871 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28871.json"
}
],
"title": "CVE-2026-28871"
},
{
"cve": "CVE-2026-28876",
"notes": [
{
"category": "description",
"text": "A parsing issue in directory path handling was fixed by improving path validation across multiple OS versions to prevent unauthorized app access to sensitive user data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28876 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28876.json"
}
],
"title": "CVE-2026-28876"
},
{
"cve": "CVE-2026-28877",
"notes": [
{
"category": "description",
"text": "An authorization vulnerability allowing apps to potentially access sensitive user data was resolved by enhancing state management in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, visionOS 26.4, and watchOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28877 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28877.json"
}
],
"title": "CVE-2026-28877"
},
{
"cve": "CVE-2026-28878",
"notes": [
{
"category": "description",
"text": "Apple addressed a privacy vulnerability that allowed apps to enumerate installed applications by removing sensitive data in updates to iOS 18.7.7, iPadOS 18.7.7, macOS Sonoma 14.8.5, and other operating systems.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28878 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28878.json"
}
],
"title": "CVE-2026-28878"
},
{
"cve": "CVE-2026-28879",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability causing potential process crashes when handling malicious web content was fixed through improved memory management in multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28879 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28879.json"
}
],
"title": "CVE-2026-28879"
},
{
"cve": "CVE-2026-28880",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems including iOS, iPadOS, macOS, and visionOS addressed a permissions issue by implementing additional restrictions to prevent apps from enumerating a user\u2019s installed applications.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28880 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28880.json"
}
],
"title": "CVE-2026-28880"
},
{
"cve": "CVE-2026-28881",
"notes": [
{
"category": "description",
"text": "macOS Tahoe 26.4 fixed a privacy vulnerability by relocating sensitive user data to prevent unauthorized app access.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28881 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28881.json"
}
],
"title": "CVE-2026-28881"
},
{
"cve": "CVE-2026-28882",
"notes": [
{
"category": "description",
"text": "An issue allowing apps to enumerate a user\u0027s installed applications was resolved through enhanced verification mechanisms in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28882 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28882.json"
}
],
"title": "CVE-2026-28882"
},
{
"cve": "CVE-2026-28886",
"notes": [
{
"category": "description",
"text": "A null pointer dereference vulnerability allowing a privileged network user to cause denial-of-service was fixed via improved input validation in multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28886 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28886.json"
}
],
"title": "CVE-2026-28886"
},
{
"cve": "CVE-2026-28888",
"notes": [
{
"category": "description",
"text": "A race condition vulnerability allowing an application to potentially gain root privileges was fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4 by improving state handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28888 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28888.json"
}
],
"title": "CVE-2026-28888"
},
{
"cve": "CVE-2026-28891",
"notes": [
{
"category": "description",
"text": "A race condition vulnerability allowing an application to potentially escape its sandbox was fixed through additional validation in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28891 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28891.json"
}
],
"title": "CVE-2026-28891"
},
{
"cve": "CVE-2026-28892",
"notes": [
{
"category": "description",
"text": "A permissions vulnerability allowing applications to modify protected file system areas was fixed by removing vulnerable code in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28892 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28892.json"
}
],
"title": "CVE-2026-28892"
},
{
"cve": "CVE-2026-28893",
"notes": [
{
"category": "description",
"text": "A privacy vulnerability involving the handling of temporary files during print preview was addressed in the macOS Tahoe 26.4 update.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28893 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28893.json"
}
],
"title": "CVE-2026-28893"
},
{
"cve": "CVE-2026-28894",
"notes": [
{
"category": "description",
"text": "A denial-of-service vulnerability in iOS 26.4, iPadOS 26.4, and multiple macOS versions was addressed by improved input validation to prevent remote attackers from causing service disruptions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28894 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28894.json"
}
],
"title": "CVE-2026-28894"
}
]
}
OPENSUSE-SU-2026:10017-1
Vulnerability from csaf_opensuse - Published: 2026-01-08 00:00 - Updated: 2026-01-08 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "curl-8.18.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the curl-8.18.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10017",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10017-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14017 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "curl-8.18.0-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-08T00:00:00Z",
"generator": {
"date": "2026-01-08T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10017-1",
"initial_release_date": "2026-01-08T00:00:00Z",
"revision_history": [
{
"date": "2026-01-08T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.18.0-1.1.aarch64",
"product": {
"name": "curl-8.18.0-1.1.aarch64",
"product_id": "curl-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "curl-fish-completion-8.18.0-1.1.aarch64",
"product": {
"name": "curl-fish-completion-8.18.0-1.1.aarch64",
"product_id": "curl-fish-completion-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.18.0-1.1.aarch64",
"product": {
"name": "curl-zsh-completion-8.18.0-1.1.aarch64",
"product_id": "curl-zsh-completion-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.18.0-1.1.aarch64",
"product": {
"name": "libcurl-devel-8.18.0-1.1.aarch64",
"product_id": "libcurl-devel-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.18.0-1.1.aarch64",
"product": {
"name": "libcurl-devel-32bit-8.18.0-1.1.aarch64",
"product_id": "libcurl-devel-32bit-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.18.0-1.1.aarch64",
"product": {
"name": "libcurl-devel-doc-8.18.0-1.1.aarch64",
"product_id": "libcurl-devel-doc-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.18.0-1.1.aarch64",
"product": {
"name": "libcurl4-8.18.0-1.1.aarch64",
"product_id": "libcurl4-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.18.0-1.1.aarch64",
"product": {
"name": "libcurl4-32bit-8.18.0-1.1.aarch64",
"product_id": "libcurl4-32bit-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "wcurl-8.18.0-1.1.aarch64",
"product": {
"name": "wcurl-8.18.0-1.1.aarch64",
"product_id": "wcurl-8.18.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.18.0-1.1.ppc64le",
"product": {
"name": "curl-8.18.0-1.1.ppc64le",
"product_id": "curl-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "curl-fish-completion-8.18.0-1.1.ppc64le",
"product": {
"name": "curl-fish-completion-8.18.0-1.1.ppc64le",
"product_id": "curl-fish-completion-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.18.0-1.1.ppc64le",
"product": {
"name": "curl-zsh-completion-8.18.0-1.1.ppc64le",
"product_id": "curl-zsh-completion-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.18.0-1.1.ppc64le",
"product": {
"name": "libcurl-devel-8.18.0-1.1.ppc64le",
"product_id": "libcurl-devel-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"product": {
"name": "libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"product_id": "libcurl-devel-32bit-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.18.0-1.1.ppc64le",
"product": {
"name": "libcurl-devel-doc-8.18.0-1.1.ppc64le",
"product_id": "libcurl-devel-doc-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.18.0-1.1.ppc64le",
"product": {
"name": "libcurl4-8.18.0-1.1.ppc64le",
"product_id": "libcurl4-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.18.0-1.1.ppc64le",
"product": {
"name": "libcurl4-32bit-8.18.0-1.1.ppc64le",
"product_id": "libcurl4-32bit-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "wcurl-8.18.0-1.1.ppc64le",
"product": {
"name": "wcurl-8.18.0-1.1.ppc64le",
"product_id": "wcurl-8.18.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.18.0-1.1.s390x",
"product": {
"name": "curl-8.18.0-1.1.s390x",
"product_id": "curl-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "curl-fish-completion-8.18.0-1.1.s390x",
"product": {
"name": "curl-fish-completion-8.18.0-1.1.s390x",
"product_id": "curl-fish-completion-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.18.0-1.1.s390x",
"product": {
"name": "curl-zsh-completion-8.18.0-1.1.s390x",
"product_id": "curl-zsh-completion-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.18.0-1.1.s390x",
"product": {
"name": "libcurl-devel-8.18.0-1.1.s390x",
"product_id": "libcurl-devel-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.18.0-1.1.s390x",
"product": {
"name": "libcurl-devel-32bit-8.18.0-1.1.s390x",
"product_id": "libcurl-devel-32bit-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.18.0-1.1.s390x",
"product": {
"name": "libcurl-devel-doc-8.18.0-1.1.s390x",
"product_id": "libcurl-devel-doc-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.18.0-1.1.s390x",
"product": {
"name": "libcurl4-8.18.0-1.1.s390x",
"product_id": "libcurl4-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.18.0-1.1.s390x",
"product": {
"name": "libcurl4-32bit-8.18.0-1.1.s390x",
"product_id": "libcurl4-32bit-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "wcurl-8.18.0-1.1.s390x",
"product": {
"name": "wcurl-8.18.0-1.1.s390x",
"product_id": "wcurl-8.18.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.18.0-1.1.x86_64",
"product": {
"name": "curl-8.18.0-1.1.x86_64",
"product_id": "curl-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "curl-fish-completion-8.18.0-1.1.x86_64",
"product": {
"name": "curl-fish-completion-8.18.0-1.1.x86_64",
"product_id": "curl-fish-completion-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.18.0-1.1.x86_64",
"product": {
"name": "curl-zsh-completion-8.18.0-1.1.x86_64",
"product_id": "curl-zsh-completion-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.18.0-1.1.x86_64",
"product": {
"name": "libcurl-devel-8.18.0-1.1.x86_64",
"product_id": "libcurl-devel-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.18.0-1.1.x86_64",
"product": {
"name": "libcurl-devel-32bit-8.18.0-1.1.x86_64",
"product_id": "libcurl-devel-32bit-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.18.0-1.1.x86_64",
"product": {
"name": "libcurl-devel-doc-8.18.0-1.1.x86_64",
"product_id": "libcurl-devel-doc-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.18.0-1.1.x86_64",
"product": {
"name": "libcurl4-8.18.0-1.1.x86_64",
"product_id": "libcurl4-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.18.0-1.1.x86_64",
"product": {
"name": "libcurl4-32bit-8.18.0-1.1.x86_64",
"product_id": "libcurl4-32bit-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "wcurl-8.18.0-1.1.x86_64",
"product": {
"name": "wcurl-8.18.0-1.1.x86_64",
"product_id": "wcurl-8.18.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64"
},
"product_reference": "curl-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le"
},
"product_reference": "curl-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-8.18.0-1.1.s390x"
},
"product_reference": "curl-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64"
},
"product_reference": "curl-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-fish-completion-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64"
},
"product_reference": "curl-fish-completion-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-fish-completion-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le"
},
"product_reference": "curl-fish-completion-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-fish-completion-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x"
},
"product_reference": "curl-fish-completion-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-fish-completion-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64"
},
"product_reference": "curl-fish-completion-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64"
},
"product_reference": "curl-zsh-completion-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le"
},
"product_reference": "curl-zsh-completion-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x"
},
"product_reference": "curl-zsh-completion-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64"
},
"product_reference": "curl-zsh-completion-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64"
},
"product_reference": "libcurl-devel-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le"
},
"product_reference": "libcurl-devel-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x"
},
"product_reference": "libcurl-devel-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64"
},
"product_reference": "libcurl-devel-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-32bit-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64"
},
"product_reference": "libcurl-devel-32bit-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-32bit-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le"
},
"product_reference": "libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-32bit-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x"
},
"product_reference": "libcurl-devel-32bit-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-32bit-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64"
},
"product_reference": "libcurl-devel-32bit-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64"
},
"product_reference": "libcurl-devel-doc-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le"
},
"product_reference": "libcurl-devel-doc-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x"
},
"product_reference": "libcurl-devel-doc-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64"
},
"product_reference": "libcurl-devel-doc-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64"
},
"product_reference": "libcurl4-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le"
},
"product_reference": "libcurl4-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x"
},
"product_reference": "libcurl4-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64"
},
"product_reference": "libcurl4-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64"
},
"product_reference": "libcurl4-32bit-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le"
},
"product_reference": "libcurl4-32bit-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x"
},
"product_reference": "libcurl4-32bit-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64"
},
"product_reference": "libcurl4-32bit-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wcurl-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64"
},
"product_reference": "wcurl-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wcurl-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le"
},
"product_reference": "wcurl-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wcurl-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x"
},
"product_reference": "wcurl-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wcurl-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
},
"product_reference": "wcurl-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14017"
}
],
"notes": [
{
"category": "general",
"text": "When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl,\nchanging TLS options in one thread would inadvertently change them globally\nand therefore possibly also affect other concurrently setup transfers.\n\nDisabling certificate verification for a specific transfer could\nunintentionally disable the feature for other threads as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14017",
"url": "https://www.suse.com/security/cve/CVE-2025-14017"
},
{
"category": "external",
"summary": "SUSE Bug 1256105 for CVE-2025-14017",
"url": "https://bugzilla.suse.com/1256105"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-14017"
},
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
OPENSUSE-SU-2026:20031-1
Vulnerability from csaf_opensuse - Published: 2026-01-14 11:01 - Updated: 2026-01-14 11:01| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\nThis update for curl fixes the following issues:\n\n- CVE-2025-14017: broken TLS options for threaded LDAPS (bsc#1256105).\n- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).\n- CVE-2025-14819: libssh global knownhost override (bsc#1255732).\n- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).\n- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-140",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20031-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE Bug 1255734",
"url": "https://bugzilla.suse.com/1255734"
},
{
"category": "self",
"summary": "SUSE Bug 1256105",
"url": "https://bugzilla.suse.com/1256105"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14017 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-01-14T11:01:44Z",
"generator": {
"date": "2026-01-14T11:01:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20031-1",
"initial_release_date": "2026-01-14T11:01:44Z",
"revision_history": [
{
"date": "2026-01-14T11:01:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.aarch64",
"product": {
"name": "curl-8.14.1-160000.4.1.aarch64",
"product_id": "curl-8.14.1-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-160000.4.1.aarch64",
"product": {
"name": "libcurl-devel-8.14.1-160000.4.1.aarch64",
"product_id": "libcurl-devel-8.14.1-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.aarch64",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.aarch64",
"product_id": "libcurl4-8.14.1-160000.4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-fish-completion-8.14.1-160000.4.1.noarch",
"product": {
"name": "curl-fish-completion-8.14.1-160000.4.1.noarch",
"product_id": "curl-fish-completion-8.14.1-160000.4.1.noarch"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.14.1-160000.4.1.noarch",
"product": {
"name": "curl-zsh-completion-8.14.1-160000.4.1.noarch",
"product_id": "curl-zsh-completion-8.14.1-160000.4.1.noarch"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"product": {
"name": "libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"product_id": "libcurl-devel-doc-8.14.1-160000.4.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.ppc64le",
"product": {
"name": "curl-8.14.1-160000.4.1.ppc64le",
"product_id": "curl-8.14.1-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-160000.4.1.ppc64le",
"product": {
"name": "libcurl-devel-8.14.1-160000.4.1.ppc64le",
"product_id": "libcurl-devel-8.14.1-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.ppc64le",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.ppc64le",
"product_id": "libcurl4-8.14.1-160000.4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.s390x",
"product": {
"name": "curl-8.14.1-160000.4.1.s390x",
"product_id": "curl-8.14.1-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-160000.4.1.s390x",
"product": {
"name": "libcurl-devel-8.14.1-160000.4.1.s390x",
"product_id": "libcurl-devel-8.14.1-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.s390x",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.s390x",
"product_id": "libcurl4-8.14.1-160000.4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.x86_64",
"product": {
"name": "curl-8.14.1-160000.4.1.x86_64",
"product_id": "curl-8.14.1-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-160000.4.1.x86_64",
"product": {
"name": "libcurl-devel-8.14.1-160000.4.1.x86_64",
"product_id": "libcurl-devel-8.14.1-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.x86_64",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.x86_64",
"product_id": "libcurl4-8.14.1-160000.4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64"
},
"product_reference": "curl-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "curl-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x"
},
"product_reference": "curl-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64"
},
"product_reference": "curl-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-fish-completion-8.14.1-160000.4.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch"
},
"product_reference": "curl-fish-completion-8.14.1-160000.4.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.14.1-160000.4.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch"
},
"product_reference": "curl-zsh-completion-8.14.1-160000.4.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.14.1-160000.4.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch"
},
"product_reference": "libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14017"
}
],
"notes": [
{
"category": "general",
"text": "When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl,\nchanging TLS options in one thread would inadvertently change them globally\nand therefore possibly also affect other concurrently setup transfers.\n\nDisabling certificate verification for a specific transfer could\nunintentionally disable the feature for other threads as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14017",
"url": "https://www.suse.com/security/cve/CVE-2025-14017"
},
{
"category": "external",
"summary": "SUSE Bug 1256105 for CVE-2025-14017",
"url": "https://bugzilla.suse.com/1256105"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T11:01:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-14017"
},
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T11:01:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T11:01:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T11:01:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T11:01:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
RHSA-2026:6893
Vulnerability from csaf_redhat - Published: 2026-04-07 15:43 - Updated: 2026-05-18 14:16An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in curl. The use of a predictable WebSocket mask pattern allows a malicious server to induce traffic that an intermediary proxy (whether configured or transparent) will misinterpret as a standard HTTP request. This confusion leads to a cache poisoning attack, where the proxy stores the server's malicious content and serves it to all users of that proxy.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. As the wolfSSH backend was documented as incomplete and fail tests, it is not expected that many users execute this code in production.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in curl. When configured to use public key pinning with QUIC connections and GnuTLS, and with standard certificate verification explicitly disabled, curl could bypass the intended public key check. This oversight allows a malicious server to impersonate a legitimate one, potentially leading to unauthorized access or information disclosure due to a failure in verifying the server's identity.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in curl. When performing multi-threaded LDAPS (Lightweight Directory Access Protocol Secure) transfers, changes to Transport Layer Security (TLS) options in one thread could inadvertently apply globally, affecting other concurrent transfers. This could lead to unintended security posture changes, such as disabling certificate verification for other threads. This vulnerability can result in a security bypass, where expected security checks are not performed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in curl. When an OAuth2 (Open Authorization) bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a different scheme like IMAP, LDAP, POP3, or SMTP, curl might incorrectly pass the bearer token to the new target host. This could lead to information disclosure, where sensitive authentication tokens are exposed to unintended recipients.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in libcurl. When handling secure connections (TLS) and reusing connection settings, libcurl could incorrectly apply a cached security setting related to certificate chain validation. This could allow libcurl to accept a server's security certificate that it should have otherwise rejected, potentially compromising the integrity of the secure connection.
A flaw was found in curl. When performing SSH-based transfers using SCP or SFTP, libcurl could mistakenly connect to hosts not listed in the user-specified knownhosts file. This occurs if the host is present in the libssh global knownhosts file, effectively bypassing the intended host verification. This could allow a remote attacker to connect to an untrusted host, potentially leading to information disclosure or man-in-the-middle attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in libcurl. When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in curl. When an application uses libcurl to make multiple Negotiate-authenticated HTTP or HTTPS requests to the same server with different credentials, libcurl may incorrectly reuse an existing connection. This logical error can cause a subsequent request to be sent using the authentication of a previous user, leading to an authentication bypass.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in curl. When an OAuth2 bearer token is used for an HTTP(S) transfer that redirects to a second URL, curl could unintentionally leak the token. This occurs if the second hostname has entries in the `.netrc` file, allowing the bearer token intended for the first host to be sent to the redirected host. This information disclosure could allow an attacker to gain unauthorized access.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in curl. This vulnerability allows curl to wrongly reuse an existing HTTP proxy connection when performing a CONNECT request to a server, even if the new request uses different authentication credentials for the HTTP proxy. This improper connection reuse could lead to an attacker gaining unauthorized access to resources or information intended for a different user.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in curl. When handling a second Server Message Block (SMB) request to the same host, curl incorrectly accesses memory that has already been freed. This memory corruption vulnerability, known as a use-after-free, could allow a remote attacker to potentially execute arbitrary code or cause a denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:\n\ncurl:\n * curl-8.19.0-3.hum1 (aarch64, x86_64)\n * libcurl-8.19.0-3.hum1 (aarch64, x86_64)\n * libcurl-devel-8.19.0-3.hum1 (aarch64, x86_64)\n * libcurl-minimal-8.19.0-3.hum1 (aarch64, x86_64)\n * curl-8.19.0-3.hum1.src (source)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:6893",
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9086",
"url": "https://access.redhat.com/security/cve/CVE-2025-9086"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-10148",
"url": "https://access.redhat.com/security/cve/CVE-2025-10148"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-10966",
"url": "https://access.redhat.com/security/cve/CVE-2025-10966"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15224",
"url": "https://access.redhat.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15079",
"url": "https://access.redhat.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14819",
"url": "https://access.redhat.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14524",
"url": "https://access.redhat.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13034",
"url": "https://access.redhat.com/security/cve/CVE-2025-13034"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-3805",
"url": "https://access.redhat.com/security/cve/CVE-2026-3805"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-3783",
"url": "https://access.redhat.com/security/cve/CVE-2026-3783"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-3784",
"url": "https://access.redhat.com/security/cve/CVE-2026-3784"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-1965",
"url": "https://access.redhat.com/security/cve/CVE-2026-1965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14017",
"url": "https://access.redhat.com/security/cve/CVE-2025-14017"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_6893.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-05-18T14:16:58+00:00",
"generator": {
"date": "2026-05-18T14:16:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2026:6893",
"initial_release_date": "2026-04-07T15:43:21+00:00",
"revision_history": [
{
"date": "2026-04-07T15:43:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-18T20:01:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-18T14:16:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-main@aarch64",
"product": {
"name": "curl-main@aarch64",
"product_id": "curl-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/curl@8.19.0-3.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-main@src",
"product": {
"name": "curl-main@src",
"product_id": "curl-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/curl@8.19.0-3.hum1?arch=source\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-main@x86_64",
"product": {
"name": "curl-main@x86_64",
"product_id": "curl-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/curl@8.19.0-3.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:curl-main@aarch64"
},
"product_reference": "curl-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:curl-main@src"
},
"product_reference": "curl-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:curl-main@x86_64"
},
"product_reference": "curl-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-9086",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-09-12T06:01:02.244669+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394750"
}
],
"notes": [
{
"category": "description",
"text": "An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libcurl: Curl out of bounds read for cookie path",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9086"
},
{
"category": "external",
"summary": "RHBZ#2394750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-9086.html",
"url": "https://curl.se/docs/CVE-2025-9086.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-9086.json",
"url": "https://curl.se/docs/CVE-2025-9086.json"
},
{
"category": "external",
"summary": "https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6",
"url": "https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3294999",
"url": "https://hackerone.com/reports/3294999"
}
],
"release_date": "2025-09-12T05:10:03.815000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: libcurl: Curl out of bounds read for cookie path"
},
{
"cve": "CVE-2025-10148",
"cwe": {
"id": "CWE-340",
"name": "Generation of Predictable Numbers or Identifiers"
},
"discovery_date": "2025-09-12T06:00:58.790751+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394749"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. The use of a predictable WebSocket mask pattern allows a malicious server to induce traffic that an intermediary proxy (whether configured or transparent) will misinterpret as a standard HTTP request. This confusion leads to a cache poisoning attack, where the proxy stores the server\u0027s malicious content and serves it to all users of that proxy.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: predictable WebSocket mask",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, a curl application must be communicating through a defective proxy that confuses a WebSocket for HTTP traffic. Additionally, this flaw requires the traffic to be done using clear text HTTP / WebSocket (ws://) and not over TLS (wss://).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-10148"
},
{
"category": "external",
"summary": "RHBZ#2394749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394749"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-10148",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10148"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-10148.html",
"url": "https://curl.se/docs/CVE-2025-10148.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-10148.json",
"url": "https://curl.se/docs/CVE-2025-10148.json"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3330839",
"url": "https://hackerone.com/reports/3330839"
}
],
"release_date": "2025-09-12T05:10:37.469000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: predictable WebSocket mask"
},
{
"cve": "CVE-2025-10966",
"cwe": {
"id": "CWE-322",
"name": "Key Exchange without Entity Authentication"
},
"discovery_date": "2025-11-07T08:00:51.044355+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2413308"
}
],
"notes": [
{
"category": "description",
"text": "curl\u0027s code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. As the wolfSSH backend was documented as incomplete and fail tests, it is not expected that many users execute this code in production.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Curl missing SFTP host verification with wolfSSH backend",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability doesn\u0027t affect any supported Red Hat product. This flaw affects only curl when built with wolfSSH backend support, meanwhile for Red Hat Enterprise Linux and other Red Hat products the default SSH backend being use is libssh. It\u0027s not possible to change this configuration in runtime, as it\u0027s a build time only configuration.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-10966"
},
{
"category": "external",
"summary": "RHBZ#2413308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413308"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-10966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10966"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/11/05/2",
"url": "http://www.openwall.com/lists/oss-security/2025/11/05/2"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-10966.html",
"url": "https://curl.se/docs/CVE-2025-10966.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-10966.json",
"url": "https://curl.se/docs/CVE-2025-10966.json"
},
{
"category": "external",
"summary": "https://github.com/curl/curl/commit/b011e3fcfb06d6c027859",
"url": "https://github.com/curl/curl/commit/b011e3fcfb06d6c027859"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3355218",
"url": "https://hackerone.com/reports/3355218"
}
],
"release_date": "2025-11-07T07:26:30.351000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: Curl missing SFTP host verification with wolfSSH backend"
},
{
"cve": "CVE-2025-13034",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2025-12-31T03:46:57.230000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When configured to use public key pinning with QUIC connections and GnuTLS, and with standard certificate verification explicitly disabled, curl could bypass the intended public key check. This oversight allows a malicious server to impersonate a legitimate one, potentially leading to unauthorized access or information disclosure due to a failure in verifying the server\u0027s identity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Public key pinning bypass via QUIC and GnuTLS allows server impersonation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. The flaw in curl occurs only when using `CURLOPT_PINNEDPUBLICKEY` with QUIC and ngtcp2 built with GnuTLS, and when standard certificate verification is explicitly disabled. This specific combination of features and configuration is uncommon in Red Hat deployments, limiting the overall impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13034"
},
{
"category": "external",
"summary": "RHBZ#2426406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13034"
}
],
"release_date": "2026-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "To mitigate this issue, ensure that standard certificate verification is not explicitly disabled when utilizing `CURLOPT_PINNEDPUBLICKEY` or `--pinnedpubkey` with curl. This practice prevents the bypass of the pinned public key check, particularly in configurations involving QUIC and `ngtcp2` built with GnuTLS. Always verify server certificates through standard means to maintain secure connections.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: Public key pinning bypass via QUIC and GnuTLS allows server impersonation"
},
{
"cve": "CVE-2025-14017",
"cwe": {
"id": "CWE-1058",
"name": "Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element"
},
"discovery_date": "2026-01-08T11:01:16.184214+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427870"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When performing multi-threaded LDAPS (Lightweight Directory Access Protocol Secure) transfers, changes to Transport Layer Security (TLS) options in one thread could inadvertently apply globally, affecting other concurrent transfers. This could lead to unintended security posture changes, such as disabling certificate verification for other threads. This vulnerability can result in a security bypass, where expected security checks are not performed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. The flaw in curl affects multi-threaded LDAPS transfers where changes to TLS options in one thread could inadvertently apply globally, impacting other concurrent transfers. This could lead to a security bypass if an application relies on specific TLS settings that are then overridden. Impact is limited to applications utilizing libcurl for multi-threaded LDAPS connections that dynamically modify TLS options.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14017"
},
{
"category": "external",
"summary": "RHBZ#2427870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427870"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14017",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14017"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-14017.html",
"url": "https://curl.se/docs/CVE-2025-14017.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-14017.json",
"url": "https://curl.se/docs/CVE-2025-14017.json"
}
],
"release_date": "2026-01-08T10:07:05.554000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers"
},
{
"cve": "CVE-2025-14524",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2025-12-31T03:46:56.325000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426407"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When an OAuth2 (Open Authorization) bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a different scheme like IMAP, LDAP, POP3, or SMTP, curl might incorrectly pass the bearer token to the new target host. This could lead to information disclosure, where sensitive authentication tokens are exposed to unintended recipients.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Information disclosure via cross-protocol redirect with OAuth2 bearer token",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat because `curl` might inadvertently pass an OAuth2 bearer token during a cross-protocol redirect from HTTP(S) to IMAP, LDAP, POP3, or SMTP schemes. This could lead to unintended information disclosure if applications using `curl` are configured to perform such redirects with bearer tokens.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "RHBZ#2426407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426407"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14524",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14524"
}
],
"release_date": "2026-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Information disclosure via cross-protocol redirect with OAuth2 bearer token"
},
{
"cve": "CVE-2025-14819",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2025-12-31T03:46:56.325000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426408"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libcurl. When handling secure connections (TLS) and reusing connection settings, libcurl could incorrectly apply a cached security setting related to certificate chain validation. This could allow libcurl to accept a server\u0027s security certificate that it should have otherwise rejected, potentially compromising the integrity of the secure connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libcurl: Improper certificate validation due to cached TLS settings reuse",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. `libcurl` could incorrectly reuse a cached CA store when applications alter the `CURLSSLOPT_NO_PARTIALCHAIN` option with re-used easy or multi handles. This could lead to the acceptance of an otherwise untrusted TLS trust chain. Exploitation requires specific application logic that dynamically changes this option while reusing `libcurl` handles.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "RHBZ#2426408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426408"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14819"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-14819.html",
"url": "https://curl.se/docs/CVE-2025-14819.html"
}
],
"release_date": "2026-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: libcurl: Improper certificate validation due to cached TLS settings reuse"
},
{
"cve": "CVE-2025-15079",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"discovery_date": "2025-12-31T03:46:56.768000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426409"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When performing SSH-based transfers using SCP or SFTP, libcurl could mistakenly connect to hosts not listed in the user-specified knownhosts file. This occurs if the host is present in the libssh global knownhosts file, effectively bypassing the intended host verification. This could allow a remote attacker to connect to an untrusted host, potentially leading to information disclosure or man-in-the-middle attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Host verification bypass during SSH transfers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat because libcurl, when configured for SSH-based transfers (SCP/SFTP) with a user-specified knownhosts file, may bypass this configuration and accept connections to hosts present in the system-wide libssh global knownhosts file. This could lead to unintended host trust in specific deployment scenarios.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "RHBZ#2426409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15079",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15079"
}
],
"release_date": "2026-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "To mitigate this issue, ensure that the system-wide `libssh` global knownhosts file (`/etc/ssh/ssh_known_hosts`) does not contain entries for untrusted hosts. Alternatively, avoid using `libcurl` for SCP or SFTP transfers in environments where strict enforcement of a user-specified knownhosts file is critical and the system-wide knownhosts file cannot be fully controlled. Services relying on `libssh` for host key verification may need to be restarted to apply the changes.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Host verification bypass during SSH transfers"
},
{
"cve": "CVE-2025-15224",
"cwe": {
"id": "CWE-305",
"name": "Authentication Bypass by Primary Weakness"
},
"discovery_date": "2025-12-31T03:58:07.013000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426410"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libcurl. When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libssh key passphrase bypass without agent set",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. The flaw in libcurl, when built with the libssh backend, allows it to wrongly attempt authentication via a locally running SSH agent during public key authentication for SCP or SFTP transfers. However, successful authentication still requires the SSH agent to possess the correct passphrase.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "RHBZ#2426410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426410"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15224",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15224"
}
],
"release_date": "2026-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: libssh key passphrase bypass without agent set"
},
{
"cve": "CVE-2026-1965",
"cwe": {
"id": "CWE-303",
"name": "Incorrect Implementation of Authentication Algorithm"
},
"discovery_date": "2026-03-11T11:00:54.752485+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2446448"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When an application uses libcurl to make multiple Negotiate-authenticated HTTP or HTTPS requests to the same server with different credentials, libcurl may incorrectly reuse an existing connection. This logical error can cause a subsequent request to be sent using the authentication of a previous user, leading to an authentication bypass.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1965"
},
{
"category": "external",
"summary": "RHBZ#2446448",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446448"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1965"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-1965.html",
"url": "https://curl.se/docs/CVE-2026-1965.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-1965.json",
"url": "https://curl.se/docs/CVE-2026-1965.json"
}
],
"release_date": "2026-03-11T10:08:52.431000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication"
},
{
"cve": "CVE-2026-3783",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2026-03-11T11:01:01.429907+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2446450"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When an OAuth2 bearer token is used for an HTTP(S) transfer that redirects to a second URL, curl could unintentionally leak the token. This occurs if the second hostname has entries in the `.netrc` file, allowing the bearer token intended for the first host to be sent to the redirected host. This information disclosure could allow an attacker to gain unauthorized access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-3783"
},
{
"category": "external",
"summary": "RHBZ#2446450",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446450"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-3783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3783"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/03/11/2",
"url": "http://www.openwall.com/lists/oss-security/2026/03/11/2"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3783.html",
"url": "https://curl.se/docs/CVE-2026-3783.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3783.json",
"url": "https://curl.se/docs/CVE-2026-3783.json"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3583983",
"url": "https://hackerone.com/reports/3583983"
}
],
"release_date": "2026-03-11T10:09:08.746000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "To prevent the leakage of OAuth2 bearer tokens, ensure that `.netrc` files are carefully managed. Avoid configuring `.netrc` entries for untrusted or unknown hostnames, particularly when `curl` is used with OAuth2 bearer tokens and is configured to follow redirects. Regularly review and restrict the scope of credentials stored in `.netrc` files to only explicitly trusted destinations.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect"
},
{
"cve": "CVE-2026-3784",
"cwe": {
"id": "CWE-305",
"name": "Authentication Bypass by Primary Weakness"
},
"discovery_date": "2026-03-11T11:00:57.752827+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2446449"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. This vulnerability allows curl to wrongly reuse an existing HTTP proxy connection when performing a CONNECT request to a server, even if the new request uses different authentication credentials for the HTTP proxy. This improper connection reuse could lead to an attacker gaining unauthorized access to resources or information intended for a different user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl: Unauthorized access due to improper HTTP proxy connection reuse",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-3784"
},
{
"category": "external",
"summary": "RHBZ#2446449",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446449"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-3784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3784"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/03/11/3",
"url": "http://www.openwall.com/lists/oss-security/2026/03/11/3"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3784.html",
"url": "https://curl.se/docs/CVE-2026-3784.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3784.json",
"url": "https://curl.se/docs/CVE-2026-3784.json"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3584903",
"url": "https://hackerone.com/reports/3584903"
}
],
"release_date": "2026-03-11T10:09:21.418000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: curl: Unauthorized access due to improper HTTP proxy connection reuse"
},
{
"cve": "CVE-2026-3805",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2026-03-11T11:01:04.465150+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2446451"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When handling a second Server Message Block (SMB) request to the same host, curl incorrectly accesses memory that has already been freed. This memory corruption vulnerability, known as a use-after-free, could allow a remote attacker to potentially execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl: Arbitrary code execution or Denial of Service via use-after-free in SMB request handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-3805"
},
{
"category": "external",
"summary": "RHBZ#2446451",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446451"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-3805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3805"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/03/11/4",
"url": "http://www.openwall.com/lists/oss-security/2026/03/11/4"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3805.html",
"url": "https://curl.se/docs/CVE-2026-3805.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3805.json",
"url": "https://curl.se/docs/CVE-2026-3805.json"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3591944",
"url": "https://hackerone.com/reports/3591944"
}
],
"release_date": "2026-03-11T10:09:37.729000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: curl: Arbitrary code execution or Denial of Service via use-after-free in SMB request handling"
}
]
}
SUSE-SU-2026:0050-1
Vulnerability from csaf_suse - Published: 2026-01-07 09:28 - Updated: 2026-01-07 09:28| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\n- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).\n- CVE-2025-14819: libssh global knownhost override (bsc#1255732).\n- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).\n- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-50,openSUSE-SLE-15.6-2026-50",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0050-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0050-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260050-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0050-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023698.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE Bug 1255734",
"url": "https://bugzilla.suse.com/1255734"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-01-07T09:28:15Z",
"generator": {
"date": "2026-01-07T09:28:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0050-1",
"initial_release_date": "2026-01-07T09:28:15Z",
"revision_history": [
{
"date": "2026-01-07T09:28:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150600.4.34.1.aarch64",
"product": {
"name": "curl-8.14.1-150600.4.34.1.aarch64",
"product_id": "curl-8.14.1-150600.4.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"product": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"product_id": "libcurl-devel-8.14.1-150600.4.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150600.4.34.1.aarch64",
"product": {
"name": "libcurl-mini4-8.14.1-150600.4.34.1.aarch64",
"product_id": "libcurl-mini4-8.14.1-150600.4.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150600.4.34.1.aarch64",
"product": {
"name": "libcurl4-8.14.1-150600.4.34.1.aarch64",
"product_id": "libcurl4-8.14.1-150600.4.34.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libcurl-devel-64bit-8.14.1-150600.4.34.1.aarch64_ilp32",
"product": {
"name": "libcurl-devel-64bit-8.14.1-150600.4.34.1.aarch64_ilp32",
"product_id": "libcurl-devel-64bit-8.14.1-150600.4.34.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libcurl4-64bit-8.14.1-150600.4.34.1.aarch64_ilp32",
"product": {
"name": "libcurl4-64bit-8.14.1-150600.4.34.1.aarch64_ilp32",
"product_id": "libcurl4-64bit-8.14.1-150600.4.34.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150600.4.34.1.i586",
"product": {
"name": "curl-8.14.1-150600.4.34.1.i586",
"product_id": "curl-8.14.1-150600.4.34.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150600.4.34.1.i586",
"product": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.i586",
"product_id": "libcurl-devel-8.14.1-150600.4.34.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150600.4.34.1.i586",
"product": {
"name": "libcurl-mini4-8.14.1-150600.4.34.1.i586",
"product_id": "libcurl-mini4-8.14.1-150600.4.34.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150600.4.34.1.i586",
"product": {
"name": "libcurl4-8.14.1-150600.4.34.1.i586",
"product_id": "libcurl4-8.14.1-150600.4.34.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-fish-completion-8.14.1-150600.4.34.1.noarch",
"product": {
"name": "curl-fish-completion-8.14.1-150600.4.34.1.noarch",
"product_id": "curl-fish-completion-8.14.1-150600.4.34.1.noarch"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.14.1-150600.4.34.1.noarch",
"product": {
"name": "curl-zsh-completion-8.14.1-150600.4.34.1.noarch",
"product_id": "curl-zsh-completion-8.14.1-150600.4.34.1.noarch"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.14.1-150600.4.34.1.noarch",
"product": {
"name": "libcurl-devel-doc-8.14.1-150600.4.34.1.noarch",
"product_id": "libcurl-devel-doc-8.14.1-150600.4.34.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150600.4.34.1.ppc64le",
"product": {
"name": "curl-8.14.1-150600.4.34.1.ppc64le",
"product_id": "curl-8.14.1-150600.4.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"product": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"product_id": "libcurl-devel-8.14.1-150600.4.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150600.4.34.1.ppc64le",
"product": {
"name": "libcurl-mini4-8.14.1-150600.4.34.1.ppc64le",
"product_id": "libcurl-mini4-8.14.1-150600.4.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150600.4.34.1.ppc64le",
"product": {
"name": "libcurl4-8.14.1-150600.4.34.1.ppc64le",
"product_id": "libcurl4-8.14.1-150600.4.34.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150600.4.34.1.s390x",
"product": {
"name": "curl-8.14.1-150600.4.34.1.s390x",
"product_id": "curl-8.14.1-150600.4.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150600.4.34.1.s390x",
"product": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.s390x",
"product_id": "libcurl-devel-8.14.1-150600.4.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150600.4.34.1.s390x",
"product": {
"name": "libcurl-mini4-8.14.1-150600.4.34.1.s390x",
"product_id": "libcurl-mini4-8.14.1-150600.4.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150600.4.34.1.s390x",
"product": {
"name": "libcurl4-8.14.1-150600.4.34.1.s390x",
"product_id": "libcurl4-8.14.1-150600.4.34.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "curl-8.14.1-150600.4.34.1.x86_64",
"product_id": "curl-8.14.1-150600.4.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"product_id": "libcurl-devel-8.14.1-150600.4.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"product_id": "libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "libcurl-mini4-8.14.1-150600.4.34.1.x86_64",
"product_id": "libcurl-mini4-8.14.1-150600.4.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "libcurl4-8.14.1-150600.4.34.1.x86_64",
"product_id": "libcurl4-8.14.1-150600.4.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"product_id": "libcurl4-32bit-8.14.1-150600.4.34.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150600.4.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64"
},
"product_reference": "curl-8.14.1-150600.4.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150600.4.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le"
},
"product_reference": "curl-8.14.1-150600.4.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150600.4.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x"
},
"product_reference": "curl-8.14.1-150600.4.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150600.4.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64"
},
"product_reference": "curl-8.14.1-150600.4.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64"
},
"product_reference": "libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le"
},
"product_reference": "libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x"
},
"product_reference": "libcurl-devel-8.14.1-150600.4.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64"
},
"product_reference": "libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64"
},
"product_reference": "libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150600.4.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-150600.4.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150600.4.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le"
},
"product_reference": "libcurl4-8.14.1-150600.4.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150600.4.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x"
},
"product_reference": "libcurl4-8.14.1-150600.4.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150600.4.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-150600.4.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.14.1-150600.4.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64"
},
"product_reference": "libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:15Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:15Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:15Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:15Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.