Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-15079 (GCVE-0-2025-15079)
Vulnerability from cvelistv5 – Published: 2026-01-08 10:08 – Updated: 2026-01-08 14:46| Vendor | Product | Version | |
|---|---|---|---|
| curl | curl |
Affected:
8.17.0 , ≤ 8.17.0
(semver)
Affected: 8.16.0 , ≤ 8.16.0 (semver) Affected: 8.15.0 , ≤ 8.15.0 (semver) Affected: 8.14.1 , ≤ 8.14.1 (semver) Affected: 8.14.0 , ≤ 8.14.0 (semver) Affected: 8.13.0 , ≤ 8.13.0 (semver) Affected: 8.12.1 , ≤ 8.12.1 (semver) Affected: 8.12.0 , ≤ 8.12.0 (semver) Affected: 8.11.1 , ≤ 8.11.1 (semver) Affected: 8.11.0 , ≤ 8.11.0 (semver) Affected: 8.10.1 , ≤ 8.10.1 (semver) Affected: 8.10.0 , ≤ 8.10.0 (semver) Affected: 8.9.1 , ≤ 8.9.1 (semver) Affected: 8.9.0 , ≤ 8.9.0 (semver) Affected: 8.8.0 , ≤ 8.8.0 (semver) Affected: 8.7.1 , ≤ 8.7.1 (semver) Affected: 8.7.0 , ≤ 8.7.0 (semver) Affected: 8.6.0 , ≤ 8.6.0 (semver) Affected: 8.5.0 , ≤ 8.5.0 (semver) Affected: 8.4.0 , ≤ 8.4.0 (semver) Affected: 8.3.0 , ≤ 8.3.0 (semver) Affected: 8.2.1 , ≤ 8.2.1 (semver) Affected: 8.2.0 , ≤ 8.2.0 (semver) Affected: 8.1.2 , ≤ 8.1.2 (semver) Affected: 8.1.1 , ≤ 8.1.1 (semver) Affected: 8.1.0 , ≤ 8.1.0 (semver) Affected: 8.0.1 , ≤ 8.0.1 (semver) Affected: 8.0.0 , ≤ 8.0.0 (semver) Affected: 7.88.1 , ≤ 7.88.1 (semver) Affected: 7.88.0 , ≤ 7.88.0 (semver) Affected: 7.87.0 , ≤ 7.87.0 (semver) Affected: 7.86.0 , ≤ 7.86.0 (semver) Affected: 7.85.0 , ≤ 7.85.0 (semver) Affected: 7.84.0 , ≤ 7.84.0 (semver) Affected: 7.83.1 , ≤ 7.83.1 (semver) Affected: 7.83.0 , ≤ 7.83.0 (semver) Affected: 7.82.0 , ≤ 7.82.0 (semver) Affected: 7.81.0 , ≤ 7.81.0 (semver) Affected: 7.80.0 , ≤ 7.80.0 (semver) Affected: 7.79.1 , ≤ 7.79.1 (semver) Affected: 7.79.0 , ≤ 7.79.0 (semver) Affected: 7.78.0 , ≤ 7.78.0 (semver) Affected: 7.77.0 , ≤ 7.77.0 (semver) Affected: 7.76.1 , ≤ 7.76.1 (semver) Affected: 7.76.0 , ≤ 7.76.0 (semver) Affected: 7.75.0 , ≤ 7.75.0 (semver) Affected: 7.74.0 , ≤ 7.74.0 (semver) Affected: 7.73.0 , ≤ 7.73.0 (semver) Affected: 7.72.0 , ≤ 7.72.0 (semver) Affected: 7.71.1 , ≤ 7.71.1 (semver) Affected: 7.71.0 , ≤ 7.71.0 (semver) Affected: 7.70.0 , ≤ 7.70.0 (semver) Affected: 7.69.1 , ≤ 7.69.1 (semver) Affected: 7.69.0 , ≤ 7.69.0 (semver) Affected: 7.68.0 , ≤ 7.68.0 (semver) Affected: 7.67.0 , ≤ 7.67.0 (semver) Affected: 7.66.0 , ≤ 7.66.0 (semver) Affected: 7.65.3 , ≤ 7.65.3 (semver) Affected: 7.65.2 , ≤ 7.65.2 (semver) Affected: 7.65.1 , ≤ 7.65.1 (semver) Affected: 7.65.0 , ≤ 7.65.0 (semver) Affected: 7.64.1 , ≤ 7.64.1 (semver) Affected: 7.64.0 , ≤ 7.64.0 (semver) Affected: 7.63.0 , ≤ 7.63.0 (semver) Affected: 7.62.0 , ≤ 7.62.0 (semver) Affected: 7.61.1 , ≤ 7.61.1 (semver) Affected: 7.61.0 , ≤ 7.61.0 (semver) Affected: 7.60.0 , ≤ 7.60.0 (semver) Affected: 7.59.0 , ≤ 7.59.0 (semver) Affected: 7.58.0 , ≤ 7.58.0 (semver) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2026-01-08T11:06:21.628Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2026/01/07/6"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-15079",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-08T14:45:34.542278Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-297",
"description": "CWE-297 Improper Validation of Certificate with Host Mismatch",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-08T14:46:47.042Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "curl",
"vendor": "curl",
"versions": [
{
"lessThanOrEqual": "8.17.0",
"status": "affected",
"version": "8.17.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.16.0",
"status": "affected",
"version": "8.16.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.15.0",
"status": "affected",
"version": "8.15.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.14.1",
"status": "affected",
"version": "8.14.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.14.0",
"status": "affected",
"version": "8.14.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.13.0",
"status": "affected",
"version": "8.13.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.12.1",
"status": "affected",
"version": "8.12.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.12.0",
"status": "affected",
"version": "8.12.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.11.1",
"status": "affected",
"version": "8.11.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.11.0",
"status": "affected",
"version": "8.11.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.10.1",
"status": "affected",
"version": "8.10.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.10.0",
"status": "affected",
"version": "8.10.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.9.1",
"status": "affected",
"version": "8.9.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.9.0",
"status": "affected",
"version": "8.9.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.8.0",
"status": "affected",
"version": "8.8.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.7.1",
"status": "affected",
"version": "8.7.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.7.0",
"status": "affected",
"version": "8.7.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.6.0",
"status": "affected",
"version": "8.6.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.5.0",
"status": "affected",
"version": "8.5.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.4.0",
"status": "affected",
"version": "8.4.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.3.0",
"status": "affected",
"version": "8.3.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.2.1",
"status": "affected",
"version": "8.2.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.2.0",
"status": "affected",
"version": "8.2.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.1.2",
"status": "affected",
"version": "8.1.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.1.1",
"status": "affected",
"version": "8.1.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.1.0",
"status": "affected",
"version": "8.1.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.0.1",
"status": "affected",
"version": "8.0.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.0.0",
"status": "affected",
"version": "8.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.88.1",
"status": "affected",
"version": "7.88.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.88.0",
"status": "affected",
"version": "7.88.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.87.0",
"status": "affected",
"version": "7.87.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.86.0",
"status": "affected",
"version": "7.86.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.85.0",
"status": "affected",
"version": "7.85.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.84.0",
"status": "affected",
"version": "7.84.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.83.1",
"status": "affected",
"version": "7.83.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.83.0",
"status": "affected",
"version": "7.83.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.82.0",
"status": "affected",
"version": "7.82.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.81.0",
"status": "affected",
"version": "7.81.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.80.0",
"status": "affected",
"version": "7.80.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.79.1",
"status": "affected",
"version": "7.79.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.79.0",
"status": "affected",
"version": "7.79.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.78.0",
"status": "affected",
"version": "7.78.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.77.0",
"status": "affected",
"version": "7.77.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.76.1",
"status": "affected",
"version": "7.76.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.76.0",
"status": "affected",
"version": "7.76.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.75.0",
"status": "affected",
"version": "7.75.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.74.0",
"status": "affected",
"version": "7.74.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.73.0",
"status": "affected",
"version": "7.73.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.72.0",
"status": "affected",
"version": "7.72.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.71.1",
"status": "affected",
"version": "7.71.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.71.0",
"status": "affected",
"version": "7.71.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.70.0",
"status": "affected",
"version": "7.70.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.69.1",
"status": "affected",
"version": "7.69.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.69.0",
"status": "affected",
"version": "7.69.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.68.0",
"status": "affected",
"version": "7.68.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.67.0",
"status": "affected",
"version": "7.67.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.66.0",
"status": "affected",
"version": "7.66.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.65.3",
"status": "affected",
"version": "7.65.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.65.2",
"status": "affected",
"version": "7.65.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.65.1",
"status": "affected",
"version": "7.65.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.65.0",
"status": "affected",
"version": "7.65.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.64.1",
"status": "affected",
"version": "7.64.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.64.0",
"status": "affected",
"version": "7.64.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.63.0",
"status": "affected",
"version": "7.63.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.62.0",
"status": "affected",
"version": "7.62.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.61.1",
"status": "affected",
"version": "7.61.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.61.0",
"status": "affected",
"version": "7.61.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.60.0",
"status": "affected",
"version": "7.60.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.59.0",
"status": "affected",
"version": "7.59.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.58.0",
"status": "affected",
"version": "7.58.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Harry Sintonen"
},
{
"lang": "en",
"type": "remediation developer",
"value": "Daniel Stenberg"
}
],
"descriptions": [
{
"lang": "en",
"value": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-297 Improper Validation of Certificate with Host Mismatch",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-08T10:08:13.410Z",
"orgId": "2499f714-1537-4658-8207-48ae4bb9eae9",
"shortName": "curl"
},
"references": [
{
"name": "json",
"url": "https://curl.se/docs/CVE-2025-15079.json"
},
{
"name": "www",
"url": "https://curl.se/docs/CVE-2025-15079.html"
},
{
"name": "issue",
"url": "https://hackerone.com/reports/3477116"
}
],
"title": "libssh global known_hosts override"
}
},
"cveMetadata": {
"assignerOrgId": "2499f714-1537-4658-8207-48ae4bb9eae9",
"assignerShortName": "curl",
"cveId": "CVE-2025-15079",
"datePublished": "2026-01-08T10:08:13.410Z",
"dateReserved": "2025-12-24T22:18:18.481Z",
"dateUpdated": "2026-01-08T14:46:47.042Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-15079",
"date": "2026-05-23",
"epss": "0.00047",
"percentile": "0.1466"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-15079\",\"sourceIdentifier\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"published\":\"2026-01-08T10:15:47.100\",\"lastModified\":\"2026-01-20T14:50:24.330\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"When doing SSH-based transfers using either SCP or SFTP, and setting the\\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\\n*not present* in the specified file if they were added as recognized in the\\nlibssh *global* known_hosts file.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-297\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.58.0\",\"versionEndExcluding\":\"8.18.0\",\"matchCriteriaId\":\"7FEF1B43-51CF-47FA-8D6C-2411D9B3F9C1\"}]}]}],\"references\":[{\"url\":\"https://curl.se/docs/CVE-2025-15079.html\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Vendor Advisory\",\"Patch\"]},{\"url\":\"https://curl.se/docs/CVE-2025-15079.json\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://hackerone.com/reports/3477116\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2026/01/07/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\",\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2026/01/07/6\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2026-01-08T11:06:21.628Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-15079\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-08T14:45:34.542278Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-297\", \"description\": \"CWE-297 Improper Validation of Certificate with Host Mismatch\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-08T14:45:56.225Z\"}}], \"cna\": {\"title\": \"libssh global known_hosts override\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Harry Sintonen\"}, {\"lang\": \"en\", \"type\": \"remediation developer\", \"value\": \"Daniel Stenberg\"}], \"affected\": [{\"vendor\": \"curl\", \"product\": \"curl\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.17.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.17.0\"}, {\"status\": \"affected\", \"version\": \"8.16.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.16.0\"}, {\"status\": \"affected\", \"version\": \"8.15.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.15.0\"}, {\"status\": \"affected\", \"version\": \"8.14.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.14.1\"}, {\"status\": \"affected\", \"version\": \"8.14.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.14.0\"}, {\"status\": \"affected\", \"version\": \"8.13.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.13.0\"}, {\"status\": \"affected\", \"version\": \"8.12.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.12.1\"}, {\"status\": \"affected\", \"version\": \"8.12.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.12.0\"}, {\"status\": \"affected\", \"version\": \"8.11.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.11.1\"}, {\"status\": \"affected\", \"version\": \"8.11.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.11.0\"}, {\"status\": \"affected\", \"version\": \"8.10.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.10.1\"}, {\"status\": \"affected\", \"version\": \"8.10.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.10.0\"}, {\"status\": \"affected\", \"version\": \"8.9.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.9.1\"}, {\"status\": \"affected\", \"version\": \"8.9.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.9.0\"}, {\"status\": \"affected\", \"version\": \"8.8.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.8.0\"}, {\"status\": \"affected\", \"version\": \"8.7.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.7.1\"}, {\"status\": \"affected\", \"version\": \"8.7.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.7.0\"}, {\"status\": \"affected\", \"version\": \"8.6.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.6.0\"}, {\"status\": \"affected\", \"version\": \"8.5.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.5.0\"}, {\"status\": \"affected\", \"version\": \"8.4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.4.0\"}, {\"status\": \"affected\", \"version\": \"8.3.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.3.0\"}, {\"status\": \"affected\", \"version\": \"8.2.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.2.1\"}, {\"status\": \"affected\", \"version\": \"8.2.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.2.0\"}, {\"status\": \"affected\", \"version\": \"8.1.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1.2\"}, {\"status\": \"affected\", \"version\": \"8.1.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1.1\"}, {\"status\": \"affected\", \"version\": \"8.1.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1.0\"}, {\"status\": \"affected\", \"version\": \"8.0.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.0.1\"}, {\"status\": \"affected\", \"version\": \"8.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.0.0\"}, {\"status\": \"affected\", \"version\": \"7.88.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.88.1\"}, {\"status\": \"affected\", \"version\": \"7.88.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.88.0\"}, {\"status\": \"affected\", \"version\": \"7.87.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.87.0\"}, {\"status\": \"affected\", \"version\": \"7.86.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.86.0\"}, {\"status\": \"affected\", \"version\": \"7.85.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.85.0\"}, {\"status\": \"affected\", \"version\": \"7.84.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.84.0\"}, {\"status\": \"affected\", \"version\": \"7.83.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.83.1\"}, {\"status\": \"affected\", \"version\": \"7.83.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.83.0\"}, {\"status\": \"affected\", \"version\": \"7.82.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.82.0\"}, {\"status\": \"affected\", \"version\": \"7.81.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.81.0\"}, {\"status\": \"affected\", \"version\": \"7.80.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.80.0\"}, {\"status\": \"affected\", \"version\": \"7.79.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.79.1\"}, {\"status\": \"affected\", \"version\": \"7.79.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.79.0\"}, {\"status\": \"affected\", \"version\": \"7.78.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.78.0\"}, {\"status\": \"affected\", \"version\": \"7.77.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.77.0\"}, {\"status\": \"affected\", \"version\": \"7.76.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.76.1\"}, {\"status\": \"affected\", \"version\": \"7.76.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.76.0\"}, {\"status\": \"affected\", \"version\": \"7.75.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.75.0\"}, {\"status\": \"affected\", \"version\": \"7.74.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.74.0\"}, {\"status\": \"affected\", \"version\": \"7.73.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.73.0\"}, {\"status\": \"affected\", \"version\": \"7.72.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.72.0\"}, {\"status\": \"affected\", \"version\": \"7.71.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.71.1\"}, {\"status\": \"affected\", \"version\": \"7.71.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.71.0\"}, {\"status\": \"affected\", \"version\": \"7.70.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.70.0\"}, {\"status\": \"affected\", \"version\": \"7.69.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.69.1\"}, {\"status\": \"affected\", \"version\": \"7.69.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.69.0\"}, {\"status\": \"affected\", \"version\": \"7.68.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.68.0\"}, {\"status\": \"affected\", \"version\": \"7.67.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.67.0\"}, {\"status\": \"affected\", \"version\": \"7.66.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.66.0\"}, {\"status\": \"affected\", \"version\": \"7.65.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.65.3\"}, {\"status\": \"affected\", \"version\": \"7.65.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.65.2\"}, {\"status\": \"affected\", \"version\": \"7.65.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.65.1\"}, {\"status\": \"affected\", \"version\": \"7.65.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.65.0\"}, {\"status\": \"affected\", \"version\": \"7.64.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.64.1\"}, {\"status\": \"affected\", \"version\": \"7.64.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.64.0\"}, {\"status\": \"affected\", \"version\": \"7.63.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.63.0\"}, {\"status\": \"affected\", \"version\": \"7.62.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.62.0\"}, {\"status\": \"affected\", \"version\": \"7.61.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.61.1\"}, {\"status\": \"affected\", \"version\": \"7.61.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.61.0\"}, {\"status\": \"affected\", \"version\": \"7.60.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.60.0\"}, {\"status\": \"affected\", \"version\": \"7.59.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.59.0\"}, {\"status\": \"affected\", \"version\": \"7.58.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.58.0\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://curl.se/docs/CVE-2025-15079.json\", \"name\": \"json\"}, {\"url\": \"https://curl.se/docs/CVE-2025-15079.html\", \"name\": \"www\"}, {\"url\": \"https://hackerone.com/reports/3477116\", \"name\": \"issue\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"When doing SSH-based transfers using either SCP or SFTP, and setting the\\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\\n*not present* in the specified file if they were added as recognized in the\\nlibssh *global* known_hosts file.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-297 Improper Validation of Certificate with Host Mismatch\"}]}], \"providerMetadata\": {\"orgId\": \"2499f714-1537-4658-8207-48ae4bb9eae9\", \"shortName\": \"curl\", \"dateUpdated\": \"2026-01-08T10:08:13.410Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-15079\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-08T14:46:47.042Z\", \"dateReserved\": \"2025-12-24T22:18:18.481Z\", \"assignerOrgId\": \"2499f714-1537-4658-8207-48ae4bb9eae9\", \"datePublished\": \"2026-01-08T10:08:13.410Z\", \"assignerShortName\": \"curl\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2025-15079
Vulnerability from fkie_nvd - Published: 2026-01-08 10:15 - Updated: 2026-01-20 14:50| URL | Tags | ||
|---|---|---|---|
| 2499f714-1537-4658-8207-48ae4bb9eae9 | https://curl.se/docs/CVE-2025-15079.html | Vendor Advisory, Patch | |
| 2499f714-1537-4658-8207-48ae4bb9eae9 | https://curl.se/docs/CVE-2025-15079.json | Vendor Advisory | |
| 2499f714-1537-4658-8207-48ae4bb9eae9 | https://hackerone.com/reports/3477116 | Exploit, Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2026/01/07/6 | Mailing List, Third Party Advisory, Patch |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7FEF1B43-51CF-47FA-8D6C-2411D9B3F9C1",
"versionEndExcluding": "8.18.0",
"versionStartIncluding": "7.58.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file."
}
],
"id": "CVE-2025-15079",
"lastModified": "2026-01-20T14:50:24.330",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-01-08T10:15:47.100",
"references": [
{
"source": "2499f714-1537-4658-8207-48ae4bb9eae9",
"tags": [
"Vendor Advisory",
"Patch"
],
"url": "https://curl.se/docs/CVE-2025-15079.html"
},
{
"source": "2499f714-1537-4658-8207-48ae4bb9eae9",
"tags": [
"Vendor Advisory"
],
"url": "https://curl.se/docs/CVE-2025-15079.json"
},
{
"source": "2499f714-1537-4658-8207-48ae4bb9eae9",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/3477116"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory",
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2026/01/07/6"
}
],
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-297"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-7Q9P-CX8R-RH2Q
Vulnerability from github – Published: 2026-01-08 12:30 – Updated: 2026-01-08 15:31When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts not present in the specified file if they were added as recognized in the libssh global known_hosts file.
{
"affected": [],
"aliases": [
"CVE-2025-15079"
],
"database_specific": {
"cwe_ids": [
"CWE-297"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-01-08T10:15:47Z",
"severity": "MODERATE"
},
"details": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"id": "GHSA-7q9p-cx8r-rh2q",
"modified": "2026-01-08T15:31:25Z",
"published": "2026-01-08T12:30:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15079"
},
{
"type": "WEB",
"url": "https://hackerone.com/reports/3477116"
},
{
"type": "WEB",
"url": "https://curl.se/docs/CVE-2025-15079.html"
},
{
"type": "WEB",
"url": "https://curl.se/docs/CVE-2025-15079.json"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/01/07/6"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
MSRC_CVE-2025-15079
Vulnerability from csaf_microsoft - Published: 2026-01-02 00:00 - Updated: 2026-03-03 01:36| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17086-13 | — |
None Available
|
|
| Unresolved product id: 17084-17 | — |
None Available
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17086-19 | — | ||
| Unresolved product id: 17086-16 | — | ||
| Unresolved product id: 17086-6 | — | ||
| Unresolved product id: 17084-4 | — | ||
| Unresolved product id: 17086-3 | — | ||
| Unresolved product id: 17084-2 | — | ||
| Unresolved product id: 17084-9 | — | ||
| Unresolved product id: 17084-8 | — | ||
| Unresolved product id: 17084-18 | — | ||
| Unresolved product id: 17086-15 | — | ||
| Unresolved product id: 17086-20 | — | ||
| Unresolved product id: 17084-14 | — | ||
| Unresolved product id: 17084-12 | — | ||
| Unresolved product id: 17084-11 | — | ||
| Unresolved product id: 17084-21 | — | ||
| Unresolved product id: 17084-7 | — | ||
| Unresolved product id: 17086-5 | — | ||
| Unresolved product id: 17086-1 | — | ||
| Unresolved product id: 17084-10 | — |
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-15079 libssh global known_hosts override - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2025-15079.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "libssh global known_hosts override",
"tracking": {
"current_release_date": "2026-03-03T01:36:49.000Z",
"generator": {
"date": "2026-03-10T07:09:26.795Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-15079",
"initial_release_date": "2026-01-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-01-09T01:09:17.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-01-10T01:01:21.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-01-13T01:02:13.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
},
{
"date": "2026-01-13T01:40:46.000Z",
"legacy_version": "4",
"number": "4",
"summary": "Information published."
},
{
"date": "2026-02-18T14:07:08.000Z",
"legacy_version": "5",
"number": "5",
"summary": "Information published."
},
{
"date": "2026-02-21T03:33:13.000Z",
"legacy_version": "6",
"number": "6",
"summary": "Information published."
},
{
"date": "2026-03-03T01:36:49.000Z",
"legacy_version": "7",
"number": "7",
"summary": "Information published."
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "cbl2 cmake 3.21.4-20",
"product": {
"name": "cbl2 cmake 3.21.4-20",
"product_id": "13"
}
},
{
"category": "product_version_range",
"name": "azl3 cmake 3.30.3-10",
"product": {
"name": "azl3 cmake 3.30.3-10",
"product_id": "17"
}
}
],
"category": "product_name",
"name": "cmake"
},
{
"category": "product_name",
"name": "cbl2 curl 8.8.0-7",
"product": {
"name": "cbl2 curl 8.8.0-7",
"product_id": "19"
}
},
{
"category": "product_name",
"name": "cbl2 rust 1.72.0-11",
"product": {
"name": "cbl2 rust 1.72.0-11",
"product_id": "16"
}
},
{
"category": "product_name",
"name": "cbl2 cmake 3.21.4-21",
"product": {
"name": "cbl2 cmake 3.21.4-21",
"product_id": "6"
}
},
{
"category": "product_name",
"name": "azl3 cmake 3.30.3-11",
"product": {
"name": "azl3 cmake 3.30.3-11",
"product_id": "4"
}
},
{
"category": "product_name",
"name": "cbl2 rust 1.72.0-13",
"product": {
"name": "cbl2 rust 1.72.0-13",
"product_id": "3"
}
},
{
"category": "product_name",
"name": "azl3 mysql 8.0.45-1",
"product": {
"name": "azl3 mysql 8.0.45-1",
"product_id": "2"
}
},
{
"category": "product_name",
"name": "azl3 rust 1.75.0-24",
"product": {
"name": "azl3 rust 1.75.0-24",
"product_id": "9"
}
},
{
"category": "product_name",
"name": "azl3 rust 1.90.0-3",
"product": {
"name": "azl3 rust 1.90.0-3",
"product_id": "8"
}
},
{
"category": "product_name",
"name": "azl3 curl 8.11.1-4",
"product": {
"name": "azl3 curl 8.11.1-4",
"product_id": "18"
}
},
{
"category": "product_name",
"name": "cbl2 mysql 8.0.44-2",
"product": {
"name": "cbl2 mysql 8.0.44-2",
"product_id": "15"
}
},
{
"category": "product_name",
"name": "cbl2 tensorflow 2.11.1-2",
"product": {
"name": "cbl2 tensorflow 2.11.1-2",
"product_id": "20"
}
},
{
"category": "product_name",
"name": "azl3 mysql 8.0.44-2",
"product": {
"name": "azl3 mysql 8.0.44-2",
"product_id": "14"
}
},
{
"category": "product_name",
"name": "azl3 rust 1.75.0-22",
"product": {
"name": "azl3 rust 1.75.0-22",
"product_id": "12"
}
},
{
"category": "product_name",
"name": "azl3 rust 1.86.0-10",
"product": {
"name": "azl3 rust 1.86.0-10",
"product_id": "11"
}
},
{
"category": "product_name",
"name": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "azl3 tensorflow 2.16.1-9",
"product_id": "21"
}
},
{
"category": "product_name",
"name": "azl3 curl 8.11.1-5",
"product": {
"name": "azl3 curl 8.11.1-5",
"product_id": "7"
}
},
{
"category": "product_name",
"name": "cbl2 curl 8.8.0-8",
"product": {
"name": "cbl2 curl 8.8.0-8",
"product_id": "5"
}
},
{
"category": "product_name",
"name": "cbl2 mysql 8.0.45-1",
"product": {
"name": "cbl2 mysql 8.0.45-1",
"product_id": "1"
}
},
{
"category": "product_name",
"name": "azl3 tensorflow 2.16.1-10",
"product": {
"name": "azl3 tensorflow 2.16.1-10",
"product_id": "10"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 curl 8.8.0-7 as a component of CBL Mariner 2.0",
"product_id": "17086-19"
},
"product_reference": "19",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 rust 1.72.0-11 as a component of CBL Mariner 2.0",
"product_id": "17086-16"
},
"product_reference": "16",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 cmake 3.21.4-21 as a component of CBL Mariner 2.0",
"product_id": "17086-6"
},
"product_reference": "6",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 cmake 3.30.3-11 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 rust 1.72.0-13 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 mysql 8.0.45-1 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rust 1.75.0-24 as a component of Azure Linux 3.0",
"product_id": "17084-9"
},
"product_reference": "9",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rust 1.90.0-3 as a component of Azure Linux 3.0",
"product_id": "17084-8"
},
"product_reference": "8",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 curl 8.11.1-4 as a component of Azure Linux 3.0",
"product_id": "17084-18"
},
"product_reference": "18",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 cmake 3.21.4-20 as a component of CBL Mariner 2.0",
"product_id": "17086-13"
},
"product_reference": "13",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 mysql 8.0.44-2 as a component of CBL Mariner 2.0",
"product_id": "17086-15"
},
"product_reference": "15",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 cmake 3.30.3-10 as a component of Azure Linux 3.0",
"product_id": "17084-17"
},
"product_reference": "17",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 tensorflow 2.11.1-2 as a component of CBL Mariner 2.0",
"product_id": "17086-20"
},
"product_reference": "20",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 mysql 8.0.44-2 as a component of Azure Linux 3.0",
"product_id": "17084-14"
},
"product_reference": "14",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rust 1.75.0-22 as a component of Azure Linux 3.0",
"product_id": "17084-12"
},
"product_reference": "12",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rust 1.86.0-10 as a component of Azure Linux 3.0",
"product_id": "17084-11"
},
"product_reference": "11",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 2.16.1-9 as a component of Azure Linux 3.0",
"product_id": "17084-21"
},
"product_reference": "21",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 curl 8.11.1-5 as a component of Azure Linux 3.0",
"product_id": "17084-7"
},
"product_reference": "7",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 curl 8.8.0-8 as a component of CBL Mariner 2.0",
"product_id": "17086-5"
},
"product_reference": "5",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 mysql 8.0.45-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 2.16.1-10 as a component of Azure Linux 3.0",
"product_id": "17084-10"
},
"product_reference": "10",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-15079",
"cwe": {
"id": "CWE-297",
"name": "Improper Validation of Certificate with Host Mismatch"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17086-6",
"17084-4",
"17086-15",
"17086-20",
"17084-21",
"17086-1",
"17084-10"
]
},
{
"label": "vulnerable_code_not_in_execute_path",
"product_ids": [
"17086-19",
"17086-16",
"17086-3",
"17084-9",
"17084-8",
"17084-18",
"17084-12",
"17084-11",
"17084-7",
"17086-5"
]
},
{
"label": "vulnerable_code_not_present",
"product_ids": [
"17084-2",
"17084-14"
]
}
],
"notes": [
{
"category": "general",
"text": "curl",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17086-13",
"17084-17"
],
"known_not_affected": [
"17086-19",
"17086-16",
"17086-6",
"17084-4",
"17086-3",
"17084-2",
"17084-9",
"17084-8",
"17084-18",
"17086-15",
"17086-20",
"17084-14",
"17084-12",
"17084-11",
"17084-21",
"17084-7",
"17086-5",
"17086-1",
"17084-10"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-15079 libssh global known_hosts override - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2025-15079.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2026-01-09T01:09:17.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-13"
]
},
{
"category": "none_available",
"date": "2026-01-09T01:09:17.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-17"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"17086-13",
"17084-17"
]
}
],
"title": "libssh global known_hosts override"
}
]
}
OPENSUSE-SU-2026:10017-1
Vulnerability from csaf_opensuse - Published: 2026-01-08 00:00 - Updated: 2026-01-08 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "curl-8.18.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the curl-8.18.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10017",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10017-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14017 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "curl-8.18.0-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-08T00:00:00Z",
"generator": {
"date": "2026-01-08T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10017-1",
"initial_release_date": "2026-01-08T00:00:00Z",
"revision_history": [
{
"date": "2026-01-08T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.18.0-1.1.aarch64",
"product": {
"name": "curl-8.18.0-1.1.aarch64",
"product_id": "curl-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "curl-fish-completion-8.18.0-1.1.aarch64",
"product": {
"name": "curl-fish-completion-8.18.0-1.1.aarch64",
"product_id": "curl-fish-completion-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.18.0-1.1.aarch64",
"product": {
"name": "curl-zsh-completion-8.18.0-1.1.aarch64",
"product_id": "curl-zsh-completion-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.18.0-1.1.aarch64",
"product": {
"name": "libcurl-devel-8.18.0-1.1.aarch64",
"product_id": "libcurl-devel-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.18.0-1.1.aarch64",
"product": {
"name": "libcurl-devel-32bit-8.18.0-1.1.aarch64",
"product_id": "libcurl-devel-32bit-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.18.0-1.1.aarch64",
"product": {
"name": "libcurl-devel-doc-8.18.0-1.1.aarch64",
"product_id": "libcurl-devel-doc-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.18.0-1.1.aarch64",
"product": {
"name": "libcurl4-8.18.0-1.1.aarch64",
"product_id": "libcurl4-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.18.0-1.1.aarch64",
"product": {
"name": "libcurl4-32bit-8.18.0-1.1.aarch64",
"product_id": "libcurl4-32bit-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "wcurl-8.18.0-1.1.aarch64",
"product": {
"name": "wcurl-8.18.0-1.1.aarch64",
"product_id": "wcurl-8.18.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.18.0-1.1.ppc64le",
"product": {
"name": "curl-8.18.0-1.1.ppc64le",
"product_id": "curl-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "curl-fish-completion-8.18.0-1.1.ppc64le",
"product": {
"name": "curl-fish-completion-8.18.0-1.1.ppc64le",
"product_id": "curl-fish-completion-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.18.0-1.1.ppc64le",
"product": {
"name": "curl-zsh-completion-8.18.0-1.1.ppc64le",
"product_id": "curl-zsh-completion-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.18.0-1.1.ppc64le",
"product": {
"name": "libcurl-devel-8.18.0-1.1.ppc64le",
"product_id": "libcurl-devel-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"product": {
"name": "libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"product_id": "libcurl-devel-32bit-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.18.0-1.1.ppc64le",
"product": {
"name": "libcurl-devel-doc-8.18.0-1.1.ppc64le",
"product_id": "libcurl-devel-doc-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.18.0-1.1.ppc64le",
"product": {
"name": "libcurl4-8.18.0-1.1.ppc64le",
"product_id": "libcurl4-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.18.0-1.1.ppc64le",
"product": {
"name": "libcurl4-32bit-8.18.0-1.1.ppc64le",
"product_id": "libcurl4-32bit-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "wcurl-8.18.0-1.1.ppc64le",
"product": {
"name": "wcurl-8.18.0-1.1.ppc64le",
"product_id": "wcurl-8.18.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.18.0-1.1.s390x",
"product": {
"name": "curl-8.18.0-1.1.s390x",
"product_id": "curl-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "curl-fish-completion-8.18.0-1.1.s390x",
"product": {
"name": "curl-fish-completion-8.18.0-1.1.s390x",
"product_id": "curl-fish-completion-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.18.0-1.1.s390x",
"product": {
"name": "curl-zsh-completion-8.18.0-1.1.s390x",
"product_id": "curl-zsh-completion-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.18.0-1.1.s390x",
"product": {
"name": "libcurl-devel-8.18.0-1.1.s390x",
"product_id": "libcurl-devel-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.18.0-1.1.s390x",
"product": {
"name": "libcurl-devel-32bit-8.18.0-1.1.s390x",
"product_id": "libcurl-devel-32bit-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.18.0-1.1.s390x",
"product": {
"name": "libcurl-devel-doc-8.18.0-1.1.s390x",
"product_id": "libcurl-devel-doc-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.18.0-1.1.s390x",
"product": {
"name": "libcurl4-8.18.0-1.1.s390x",
"product_id": "libcurl4-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.18.0-1.1.s390x",
"product": {
"name": "libcurl4-32bit-8.18.0-1.1.s390x",
"product_id": "libcurl4-32bit-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "wcurl-8.18.0-1.1.s390x",
"product": {
"name": "wcurl-8.18.0-1.1.s390x",
"product_id": "wcurl-8.18.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.18.0-1.1.x86_64",
"product": {
"name": "curl-8.18.0-1.1.x86_64",
"product_id": "curl-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "curl-fish-completion-8.18.0-1.1.x86_64",
"product": {
"name": "curl-fish-completion-8.18.0-1.1.x86_64",
"product_id": "curl-fish-completion-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.18.0-1.1.x86_64",
"product": {
"name": "curl-zsh-completion-8.18.0-1.1.x86_64",
"product_id": "curl-zsh-completion-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.18.0-1.1.x86_64",
"product": {
"name": "libcurl-devel-8.18.0-1.1.x86_64",
"product_id": "libcurl-devel-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.18.0-1.1.x86_64",
"product": {
"name": "libcurl-devel-32bit-8.18.0-1.1.x86_64",
"product_id": "libcurl-devel-32bit-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.18.0-1.1.x86_64",
"product": {
"name": "libcurl-devel-doc-8.18.0-1.1.x86_64",
"product_id": "libcurl-devel-doc-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.18.0-1.1.x86_64",
"product": {
"name": "libcurl4-8.18.0-1.1.x86_64",
"product_id": "libcurl4-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.18.0-1.1.x86_64",
"product": {
"name": "libcurl4-32bit-8.18.0-1.1.x86_64",
"product_id": "libcurl4-32bit-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "wcurl-8.18.0-1.1.x86_64",
"product": {
"name": "wcurl-8.18.0-1.1.x86_64",
"product_id": "wcurl-8.18.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64"
},
"product_reference": "curl-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le"
},
"product_reference": "curl-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-8.18.0-1.1.s390x"
},
"product_reference": "curl-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64"
},
"product_reference": "curl-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-fish-completion-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64"
},
"product_reference": "curl-fish-completion-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-fish-completion-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le"
},
"product_reference": "curl-fish-completion-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-fish-completion-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x"
},
"product_reference": "curl-fish-completion-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-fish-completion-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64"
},
"product_reference": "curl-fish-completion-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64"
},
"product_reference": "curl-zsh-completion-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le"
},
"product_reference": "curl-zsh-completion-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x"
},
"product_reference": "curl-zsh-completion-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64"
},
"product_reference": "curl-zsh-completion-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64"
},
"product_reference": "libcurl-devel-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le"
},
"product_reference": "libcurl-devel-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x"
},
"product_reference": "libcurl-devel-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64"
},
"product_reference": "libcurl-devel-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-32bit-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64"
},
"product_reference": "libcurl-devel-32bit-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-32bit-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le"
},
"product_reference": "libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-32bit-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x"
},
"product_reference": "libcurl-devel-32bit-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-32bit-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64"
},
"product_reference": "libcurl-devel-32bit-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64"
},
"product_reference": "libcurl-devel-doc-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le"
},
"product_reference": "libcurl-devel-doc-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x"
},
"product_reference": "libcurl-devel-doc-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64"
},
"product_reference": "libcurl-devel-doc-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64"
},
"product_reference": "libcurl4-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le"
},
"product_reference": "libcurl4-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x"
},
"product_reference": "libcurl4-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64"
},
"product_reference": "libcurl4-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64"
},
"product_reference": "libcurl4-32bit-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le"
},
"product_reference": "libcurl4-32bit-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x"
},
"product_reference": "libcurl4-32bit-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64"
},
"product_reference": "libcurl4-32bit-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wcurl-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64"
},
"product_reference": "wcurl-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wcurl-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le"
},
"product_reference": "wcurl-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wcurl-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x"
},
"product_reference": "wcurl-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wcurl-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
},
"product_reference": "wcurl-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14017"
}
],
"notes": [
{
"category": "general",
"text": "When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl,\nchanging TLS options in one thread would inadvertently change them globally\nand therefore possibly also affect other concurrently setup transfers.\n\nDisabling certificate verification for a specific transfer could\nunintentionally disable the feature for other threads as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14017",
"url": "https://www.suse.com/security/cve/CVE-2025-14017"
},
{
"category": "external",
"summary": "SUSE Bug 1256105 for CVE-2025-14017",
"url": "https://bugzilla.suse.com/1256105"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-14017"
},
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
OPENSUSE-SU-2026:20031-1
Vulnerability from csaf_opensuse - Published: 2026-01-14 11:01 - Updated: 2026-01-14 11:01| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\nThis update for curl fixes the following issues:\n\n- CVE-2025-14017: broken TLS options for threaded LDAPS (bsc#1256105).\n- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).\n- CVE-2025-14819: libssh global knownhost override (bsc#1255732).\n- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).\n- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-140",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20031-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE Bug 1255734",
"url": "https://bugzilla.suse.com/1255734"
},
{
"category": "self",
"summary": "SUSE Bug 1256105",
"url": "https://bugzilla.suse.com/1256105"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14017 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-01-14T11:01:44Z",
"generator": {
"date": "2026-01-14T11:01:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20031-1",
"initial_release_date": "2026-01-14T11:01:44Z",
"revision_history": [
{
"date": "2026-01-14T11:01:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.aarch64",
"product": {
"name": "curl-8.14.1-160000.4.1.aarch64",
"product_id": "curl-8.14.1-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-160000.4.1.aarch64",
"product": {
"name": "libcurl-devel-8.14.1-160000.4.1.aarch64",
"product_id": "libcurl-devel-8.14.1-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.aarch64",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.aarch64",
"product_id": "libcurl4-8.14.1-160000.4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-fish-completion-8.14.1-160000.4.1.noarch",
"product": {
"name": "curl-fish-completion-8.14.1-160000.4.1.noarch",
"product_id": "curl-fish-completion-8.14.1-160000.4.1.noarch"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.14.1-160000.4.1.noarch",
"product": {
"name": "curl-zsh-completion-8.14.1-160000.4.1.noarch",
"product_id": "curl-zsh-completion-8.14.1-160000.4.1.noarch"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"product": {
"name": "libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"product_id": "libcurl-devel-doc-8.14.1-160000.4.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.ppc64le",
"product": {
"name": "curl-8.14.1-160000.4.1.ppc64le",
"product_id": "curl-8.14.1-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-160000.4.1.ppc64le",
"product": {
"name": "libcurl-devel-8.14.1-160000.4.1.ppc64le",
"product_id": "libcurl-devel-8.14.1-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.ppc64le",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.ppc64le",
"product_id": "libcurl4-8.14.1-160000.4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.s390x",
"product": {
"name": "curl-8.14.1-160000.4.1.s390x",
"product_id": "curl-8.14.1-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-160000.4.1.s390x",
"product": {
"name": "libcurl-devel-8.14.1-160000.4.1.s390x",
"product_id": "libcurl-devel-8.14.1-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.s390x",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.s390x",
"product_id": "libcurl4-8.14.1-160000.4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.x86_64",
"product": {
"name": "curl-8.14.1-160000.4.1.x86_64",
"product_id": "curl-8.14.1-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-160000.4.1.x86_64",
"product": {
"name": "libcurl-devel-8.14.1-160000.4.1.x86_64",
"product_id": "libcurl-devel-8.14.1-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.x86_64",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.x86_64",
"product_id": "libcurl4-8.14.1-160000.4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64"
},
"product_reference": "curl-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "curl-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x"
},
"product_reference": "curl-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64"
},
"product_reference": "curl-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-fish-completion-8.14.1-160000.4.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch"
},
"product_reference": "curl-fish-completion-8.14.1-160000.4.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.14.1-160000.4.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch"
},
"product_reference": "curl-zsh-completion-8.14.1-160000.4.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.14.1-160000.4.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch"
},
"product_reference": "libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14017"
}
],
"notes": [
{
"category": "general",
"text": "When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl,\nchanging TLS options in one thread would inadvertently change them globally\nand therefore possibly also affect other concurrently setup transfers.\n\nDisabling certificate verification for a specific transfer could\nunintentionally disable the feature for other threads as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14017",
"url": "https://www.suse.com/security/cve/CVE-2025-14017"
},
{
"category": "external",
"summary": "SUSE Bug 1256105 for CVE-2025-14017",
"url": "https://bugzilla.suse.com/1256105"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T11:01:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-14017"
},
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T11:01:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T11:01:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T11:01:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T11:01:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
RHSA-2026:6893
Vulnerability from csaf_redhat - Published: 2026-04-07 15:43 - Updated: 2026-05-18 14:16An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in curl. The use of a predictable WebSocket mask pattern allows a malicious server to induce traffic that an intermediary proxy (whether configured or transparent) will misinterpret as a standard HTTP request. This confusion leads to a cache poisoning attack, where the proxy stores the server's malicious content and serves it to all users of that proxy.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. As the wolfSSH backend was documented as incomplete and fail tests, it is not expected that many users execute this code in production.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in curl. When configured to use public key pinning with QUIC connections and GnuTLS, and with standard certificate verification explicitly disabled, curl could bypass the intended public key check. This oversight allows a malicious server to impersonate a legitimate one, potentially leading to unauthorized access or information disclosure due to a failure in verifying the server's identity.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in curl. When performing multi-threaded LDAPS (Lightweight Directory Access Protocol Secure) transfers, changes to Transport Layer Security (TLS) options in one thread could inadvertently apply globally, affecting other concurrent transfers. This could lead to unintended security posture changes, such as disabling certificate verification for other threads. This vulnerability can result in a security bypass, where expected security checks are not performed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in curl. When an OAuth2 (Open Authorization) bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a different scheme like IMAP, LDAP, POP3, or SMTP, curl might incorrectly pass the bearer token to the new target host. This could lead to information disclosure, where sensitive authentication tokens are exposed to unintended recipients.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in libcurl. When handling secure connections (TLS) and reusing connection settings, libcurl could incorrectly apply a cached security setting related to certificate chain validation. This could allow libcurl to accept a server's security certificate that it should have otherwise rejected, potentially compromising the integrity of the secure connection.
A flaw was found in curl. When performing SSH-based transfers using SCP or SFTP, libcurl could mistakenly connect to hosts not listed in the user-specified knownhosts file. This occurs if the host is present in the libssh global knownhosts file, effectively bypassing the intended host verification. This could allow a remote attacker to connect to an untrusted host, potentially leading to information disclosure or man-in-the-middle attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in libcurl. When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in curl. When an application uses libcurl to make multiple Negotiate-authenticated HTTP or HTTPS requests to the same server with different credentials, libcurl may incorrectly reuse an existing connection. This logical error can cause a subsequent request to be sent using the authentication of a previous user, leading to an authentication bypass.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in curl. When an OAuth2 bearer token is used for an HTTP(S) transfer that redirects to a second URL, curl could unintentionally leak the token. This occurs if the second hostname has entries in the `.netrc` file, allowing the bearer token intended for the first host to be sent to the redirected host. This information disclosure could allow an attacker to gain unauthorized access.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in curl. This vulnerability allows curl to wrongly reuse an existing HTTP proxy connection when performing a CONNECT request to a server, even if the new request uses different authentication credentials for the HTTP proxy. This improper connection reuse could lead to an attacker gaining unauthorized access to resources or information intended for a different user.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in curl. When handling a second Server Message Block (SMB) request to the same host, curl incorrectly accesses memory that has already been freed. This memory corruption vulnerability, known as a use-after-free, could allow a remote attacker to potentially execute arbitrary code or cause a denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:curl-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:curl-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:\n\ncurl:\n * curl-8.19.0-3.hum1 (aarch64, x86_64)\n * libcurl-8.19.0-3.hum1 (aarch64, x86_64)\n * libcurl-devel-8.19.0-3.hum1 (aarch64, x86_64)\n * libcurl-minimal-8.19.0-3.hum1 (aarch64, x86_64)\n * curl-8.19.0-3.hum1.src (source)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:6893",
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9086",
"url": "https://access.redhat.com/security/cve/CVE-2025-9086"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-10148",
"url": "https://access.redhat.com/security/cve/CVE-2025-10148"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-10966",
"url": "https://access.redhat.com/security/cve/CVE-2025-10966"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15224",
"url": "https://access.redhat.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15079",
"url": "https://access.redhat.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14819",
"url": "https://access.redhat.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14524",
"url": "https://access.redhat.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13034",
"url": "https://access.redhat.com/security/cve/CVE-2025-13034"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-3805",
"url": "https://access.redhat.com/security/cve/CVE-2026-3805"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-3783",
"url": "https://access.redhat.com/security/cve/CVE-2026-3783"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-3784",
"url": "https://access.redhat.com/security/cve/CVE-2026-3784"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-1965",
"url": "https://access.redhat.com/security/cve/CVE-2026-1965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14017",
"url": "https://access.redhat.com/security/cve/CVE-2025-14017"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_6893.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-05-18T14:16:58+00:00",
"generator": {
"date": "2026-05-18T14:16:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2026:6893",
"initial_release_date": "2026-04-07T15:43:21+00:00",
"revision_history": [
{
"date": "2026-04-07T15:43:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-18T20:01:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-18T14:16:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-main@aarch64",
"product": {
"name": "curl-main@aarch64",
"product_id": "curl-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/curl@8.19.0-3.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-main@src",
"product": {
"name": "curl-main@src",
"product_id": "curl-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/curl@8.19.0-3.hum1?arch=source\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-main@x86_64",
"product": {
"name": "curl-main@x86_64",
"product_id": "curl-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/curl@8.19.0-3.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:curl-main@aarch64"
},
"product_reference": "curl-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:curl-main@src"
},
"product_reference": "curl-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:curl-main@x86_64"
},
"product_reference": "curl-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-9086",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-09-12T06:01:02.244669+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394750"
}
],
"notes": [
{
"category": "description",
"text": "An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libcurl: Curl out of bounds read for cookie path",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9086"
},
{
"category": "external",
"summary": "RHBZ#2394750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-9086.html",
"url": "https://curl.se/docs/CVE-2025-9086.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-9086.json",
"url": "https://curl.se/docs/CVE-2025-9086.json"
},
{
"category": "external",
"summary": "https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6",
"url": "https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3294999",
"url": "https://hackerone.com/reports/3294999"
}
],
"release_date": "2025-09-12T05:10:03.815000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: libcurl: Curl out of bounds read for cookie path"
},
{
"cve": "CVE-2025-10148",
"cwe": {
"id": "CWE-340",
"name": "Generation of Predictable Numbers or Identifiers"
},
"discovery_date": "2025-09-12T06:00:58.790751+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394749"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. The use of a predictable WebSocket mask pattern allows a malicious server to induce traffic that an intermediary proxy (whether configured or transparent) will misinterpret as a standard HTTP request. This confusion leads to a cache poisoning attack, where the proxy stores the server\u0027s malicious content and serves it to all users of that proxy.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: predictable WebSocket mask",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, a curl application must be communicating through a defective proxy that confuses a WebSocket for HTTP traffic. Additionally, this flaw requires the traffic to be done using clear text HTTP / WebSocket (ws://) and not over TLS (wss://).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-10148"
},
{
"category": "external",
"summary": "RHBZ#2394749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394749"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-10148",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10148"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-10148.html",
"url": "https://curl.se/docs/CVE-2025-10148.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-10148.json",
"url": "https://curl.se/docs/CVE-2025-10148.json"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3330839",
"url": "https://hackerone.com/reports/3330839"
}
],
"release_date": "2025-09-12T05:10:37.469000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: predictable WebSocket mask"
},
{
"cve": "CVE-2025-10966",
"cwe": {
"id": "CWE-322",
"name": "Key Exchange without Entity Authentication"
},
"discovery_date": "2025-11-07T08:00:51.044355+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2413308"
}
],
"notes": [
{
"category": "description",
"text": "curl\u0027s code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. As the wolfSSH backend was documented as incomplete and fail tests, it is not expected that many users execute this code in production.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Curl missing SFTP host verification with wolfSSH backend",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability doesn\u0027t affect any supported Red Hat product. This flaw affects only curl when built with wolfSSH backend support, meanwhile for Red Hat Enterprise Linux and other Red Hat products the default SSH backend being use is libssh. It\u0027s not possible to change this configuration in runtime, as it\u0027s a build time only configuration.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-10966"
},
{
"category": "external",
"summary": "RHBZ#2413308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413308"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-10966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10966"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/11/05/2",
"url": "http://www.openwall.com/lists/oss-security/2025/11/05/2"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-10966.html",
"url": "https://curl.se/docs/CVE-2025-10966.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-10966.json",
"url": "https://curl.se/docs/CVE-2025-10966.json"
},
{
"category": "external",
"summary": "https://github.com/curl/curl/commit/b011e3fcfb06d6c027859",
"url": "https://github.com/curl/curl/commit/b011e3fcfb06d6c027859"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3355218",
"url": "https://hackerone.com/reports/3355218"
}
],
"release_date": "2025-11-07T07:26:30.351000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: Curl missing SFTP host verification with wolfSSH backend"
},
{
"cve": "CVE-2025-13034",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2025-12-31T03:46:57.230000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When configured to use public key pinning with QUIC connections and GnuTLS, and with standard certificate verification explicitly disabled, curl could bypass the intended public key check. This oversight allows a malicious server to impersonate a legitimate one, potentially leading to unauthorized access or information disclosure due to a failure in verifying the server\u0027s identity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Public key pinning bypass via QUIC and GnuTLS allows server impersonation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. The flaw in curl occurs only when using `CURLOPT_PINNEDPUBLICKEY` with QUIC and ngtcp2 built with GnuTLS, and when standard certificate verification is explicitly disabled. This specific combination of features and configuration is uncommon in Red Hat deployments, limiting the overall impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13034"
},
{
"category": "external",
"summary": "RHBZ#2426406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13034"
}
],
"release_date": "2026-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "To mitigate this issue, ensure that standard certificate verification is not explicitly disabled when utilizing `CURLOPT_PINNEDPUBLICKEY` or `--pinnedpubkey` with curl. This practice prevents the bypass of the pinned public key check, particularly in configurations involving QUIC and `ngtcp2` built with GnuTLS. Always verify server certificates through standard means to maintain secure connections.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: Public key pinning bypass via QUIC and GnuTLS allows server impersonation"
},
{
"cve": "CVE-2025-14017",
"cwe": {
"id": "CWE-1058",
"name": "Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element"
},
"discovery_date": "2026-01-08T11:01:16.184214+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427870"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When performing multi-threaded LDAPS (Lightweight Directory Access Protocol Secure) transfers, changes to Transport Layer Security (TLS) options in one thread could inadvertently apply globally, affecting other concurrent transfers. This could lead to unintended security posture changes, such as disabling certificate verification for other threads. This vulnerability can result in a security bypass, where expected security checks are not performed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. The flaw in curl affects multi-threaded LDAPS transfers where changes to TLS options in one thread could inadvertently apply globally, impacting other concurrent transfers. This could lead to a security bypass if an application relies on specific TLS settings that are then overridden. Impact is limited to applications utilizing libcurl for multi-threaded LDAPS connections that dynamically modify TLS options.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14017"
},
{
"category": "external",
"summary": "RHBZ#2427870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427870"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14017",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14017"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-14017.html",
"url": "https://curl.se/docs/CVE-2025-14017.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-14017.json",
"url": "https://curl.se/docs/CVE-2025-14017.json"
}
],
"release_date": "2026-01-08T10:07:05.554000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers"
},
{
"cve": "CVE-2025-14524",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2025-12-31T03:46:56.325000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426407"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When an OAuth2 (Open Authorization) bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a different scheme like IMAP, LDAP, POP3, or SMTP, curl might incorrectly pass the bearer token to the new target host. This could lead to information disclosure, where sensitive authentication tokens are exposed to unintended recipients.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Information disclosure via cross-protocol redirect with OAuth2 bearer token",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat because `curl` might inadvertently pass an OAuth2 bearer token during a cross-protocol redirect from HTTP(S) to IMAP, LDAP, POP3, or SMTP schemes. This could lead to unintended information disclosure if applications using `curl` are configured to perform such redirects with bearer tokens.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "RHBZ#2426407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426407"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14524",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14524"
}
],
"release_date": "2026-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Information disclosure via cross-protocol redirect with OAuth2 bearer token"
},
{
"cve": "CVE-2025-14819",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2025-12-31T03:46:56.325000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426408"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libcurl. When handling secure connections (TLS) and reusing connection settings, libcurl could incorrectly apply a cached security setting related to certificate chain validation. This could allow libcurl to accept a server\u0027s security certificate that it should have otherwise rejected, potentially compromising the integrity of the secure connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libcurl: Improper certificate validation due to cached TLS settings reuse",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. `libcurl` could incorrectly reuse a cached CA store when applications alter the `CURLSSLOPT_NO_PARTIALCHAIN` option with re-used easy or multi handles. This could lead to the acceptance of an otherwise untrusted TLS trust chain. Exploitation requires specific application logic that dynamically changes this option while reusing `libcurl` handles.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "RHBZ#2426408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426408"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14819"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-14819.html",
"url": "https://curl.se/docs/CVE-2025-14819.html"
}
],
"release_date": "2026-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: libcurl: Improper certificate validation due to cached TLS settings reuse"
},
{
"cve": "CVE-2025-15079",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"discovery_date": "2025-12-31T03:46:56.768000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426409"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When performing SSH-based transfers using SCP or SFTP, libcurl could mistakenly connect to hosts not listed in the user-specified knownhosts file. This occurs if the host is present in the libssh global knownhosts file, effectively bypassing the intended host verification. This could allow a remote attacker to connect to an untrusted host, potentially leading to information disclosure or man-in-the-middle attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Host verification bypass during SSH transfers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat because libcurl, when configured for SSH-based transfers (SCP/SFTP) with a user-specified knownhosts file, may bypass this configuration and accept connections to hosts present in the system-wide libssh global knownhosts file. This could lead to unintended host trust in specific deployment scenarios.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "RHBZ#2426409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15079",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15079"
}
],
"release_date": "2026-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "To mitigate this issue, ensure that the system-wide `libssh` global knownhosts file (`/etc/ssh/ssh_known_hosts`) does not contain entries for untrusted hosts. Alternatively, avoid using `libcurl` for SCP or SFTP transfers in environments where strict enforcement of a user-specified knownhosts file is critical and the system-wide knownhosts file cannot be fully controlled. Services relying on `libssh` for host key verification may need to be restarted to apply the changes.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Host verification bypass during SSH transfers"
},
{
"cve": "CVE-2025-15224",
"cwe": {
"id": "CWE-305",
"name": "Authentication Bypass by Primary Weakness"
},
"discovery_date": "2025-12-31T03:58:07.013000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426410"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libcurl. When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libssh key passphrase bypass without agent set",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. The flaw in libcurl, when built with the libssh backend, allows it to wrongly attempt authentication via a locally running SSH agent during public key authentication for SCP or SFTP transfers. However, successful authentication still requires the SSH agent to possess the correct passphrase.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "RHBZ#2426410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426410"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15224",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15224"
}
],
"release_date": "2026-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: libssh key passphrase bypass without agent set"
},
{
"cve": "CVE-2026-1965",
"cwe": {
"id": "CWE-303",
"name": "Incorrect Implementation of Authentication Algorithm"
},
"discovery_date": "2026-03-11T11:00:54.752485+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2446448"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When an application uses libcurl to make multiple Negotiate-authenticated HTTP or HTTPS requests to the same server with different credentials, libcurl may incorrectly reuse an existing connection. This logical error can cause a subsequent request to be sent using the authentication of a previous user, leading to an authentication bypass.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1965"
},
{
"category": "external",
"summary": "RHBZ#2446448",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446448"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1965"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-1965.html",
"url": "https://curl.se/docs/CVE-2026-1965.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-1965.json",
"url": "https://curl.se/docs/CVE-2026-1965.json"
}
],
"release_date": "2026-03-11T10:08:52.431000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication"
},
{
"cve": "CVE-2026-3783",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2026-03-11T11:01:01.429907+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2446450"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When an OAuth2 bearer token is used for an HTTP(S) transfer that redirects to a second URL, curl could unintentionally leak the token. This occurs if the second hostname has entries in the `.netrc` file, allowing the bearer token intended for the first host to be sent to the redirected host. This information disclosure could allow an attacker to gain unauthorized access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-3783"
},
{
"category": "external",
"summary": "RHBZ#2446450",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446450"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-3783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3783"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/03/11/2",
"url": "http://www.openwall.com/lists/oss-security/2026/03/11/2"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3783.html",
"url": "https://curl.se/docs/CVE-2026-3783.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3783.json",
"url": "https://curl.se/docs/CVE-2026-3783.json"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3583983",
"url": "https://hackerone.com/reports/3583983"
}
],
"release_date": "2026-03-11T10:09:08.746000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "To prevent the leakage of OAuth2 bearer tokens, ensure that `.netrc` files are carefully managed. Avoid configuring `.netrc` entries for untrusted or unknown hostnames, particularly when `curl` is used with OAuth2 bearer tokens and is configured to follow redirects. Regularly review and restrict the scope of credentials stored in `.netrc` files to only explicitly trusted destinations.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect"
},
{
"cve": "CVE-2026-3784",
"cwe": {
"id": "CWE-305",
"name": "Authentication Bypass by Primary Weakness"
},
"discovery_date": "2026-03-11T11:00:57.752827+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2446449"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. This vulnerability allows curl to wrongly reuse an existing HTTP proxy connection when performing a CONNECT request to a server, even if the new request uses different authentication credentials for the HTTP proxy. This improper connection reuse could lead to an attacker gaining unauthorized access to resources or information intended for a different user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl: Unauthorized access due to improper HTTP proxy connection reuse",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-3784"
},
{
"category": "external",
"summary": "RHBZ#2446449",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446449"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-3784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3784"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/03/11/3",
"url": "http://www.openwall.com/lists/oss-security/2026/03/11/3"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3784.html",
"url": "https://curl.se/docs/CVE-2026-3784.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3784.json",
"url": "https://curl.se/docs/CVE-2026-3784.json"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3584903",
"url": "https://hackerone.com/reports/3584903"
}
],
"release_date": "2026-03-11T10:09:21.418000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: curl: Unauthorized access due to improper HTTP proxy connection reuse"
},
{
"cve": "CVE-2026-3805",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2026-03-11T11:01:04.465150+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2446451"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When handling a second Server Message Block (SMB) request to the same host, curl incorrectly accesses memory that has already been freed. This memory corruption vulnerability, known as a use-after-free, could allow a remote attacker to potentially execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl: Arbitrary code execution or Denial of Service via use-after-free in SMB request handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-3805"
},
{
"category": "external",
"summary": "RHBZ#2446451",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446451"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-3805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3805"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/03/11/4",
"url": "http://www.openwall.com/lists/oss-security/2026/03/11/4"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3805.html",
"url": "https://curl.se/docs/CVE-2026-3805.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3805.json",
"url": "https://curl.se/docs/CVE-2026-3805.json"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3591944",
"url": "https://hackerone.com/reports/3591944"
}
],
"release_date": "2026-03-11T10:09:37.729000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: curl: Arbitrary code execution or Denial of Service via use-after-free in SMB request handling"
}
]
}
SUSE-SU-2026:0050-1
Vulnerability from csaf_suse - Published: 2026-01-07 09:28 - Updated: 2026-01-07 09:28| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\n- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).\n- CVE-2025-14819: libssh global knownhost override (bsc#1255732).\n- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).\n- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-50,openSUSE-SLE-15.6-2026-50",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0050-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0050-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260050-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0050-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023698.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE Bug 1255734",
"url": "https://bugzilla.suse.com/1255734"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-01-07T09:28:15Z",
"generator": {
"date": "2026-01-07T09:28:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0050-1",
"initial_release_date": "2026-01-07T09:28:15Z",
"revision_history": [
{
"date": "2026-01-07T09:28:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150600.4.34.1.aarch64",
"product": {
"name": "curl-8.14.1-150600.4.34.1.aarch64",
"product_id": "curl-8.14.1-150600.4.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"product": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"product_id": "libcurl-devel-8.14.1-150600.4.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150600.4.34.1.aarch64",
"product": {
"name": "libcurl-mini4-8.14.1-150600.4.34.1.aarch64",
"product_id": "libcurl-mini4-8.14.1-150600.4.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150600.4.34.1.aarch64",
"product": {
"name": "libcurl4-8.14.1-150600.4.34.1.aarch64",
"product_id": "libcurl4-8.14.1-150600.4.34.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libcurl-devel-64bit-8.14.1-150600.4.34.1.aarch64_ilp32",
"product": {
"name": "libcurl-devel-64bit-8.14.1-150600.4.34.1.aarch64_ilp32",
"product_id": "libcurl-devel-64bit-8.14.1-150600.4.34.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libcurl4-64bit-8.14.1-150600.4.34.1.aarch64_ilp32",
"product": {
"name": "libcurl4-64bit-8.14.1-150600.4.34.1.aarch64_ilp32",
"product_id": "libcurl4-64bit-8.14.1-150600.4.34.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150600.4.34.1.i586",
"product": {
"name": "curl-8.14.1-150600.4.34.1.i586",
"product_id": "curl-8.14.1-150600.4.34.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150600.4.34.1.i586",
"product": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.i586",
"product_id": "libcurl-devel-8.14.1-150600.4.34.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150600.4.34.1.i586",
"product": {
"name": "libcurl-mini4-8.14.1-150600.4.34.1.i586",
"product_id": "libcurl-mini4-8.14.1-150600.4.34.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150600.4.34.1.i586",
"product": {
"name": "libcurl4-8.14.1-150600.4.34.1.i586",
"product_id": "libcurl4-8.14.1-150600.4.34.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-fish-completion-8.14.1-150600.4.34.1.noarch",
"product": {
"name": "curl-fish-completion-8.14.1-150600.4.34.1.noarch",
"product_id": "curl-fish-completion-8.14.1-150600.4.34.1.noarch"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.14.1-150600.4.34.1.noarch",
"product": {
"name": "curl-zsh-completion-8.14.1-150600.4.34.1.noarch",
"product_id": "curl-zsh-completion-8.14.1-150600.4.34.1.noarch"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.14.1-150600.4.34.1.noarch",
"product": {
"name": "libcurl-devel-doc-8.14.1-150600.4.34.1.noarch",
"product_id": "libcurl-devel-doc-8.14.1-150600.4.34.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150600.4.34.1.ppc64le",
"product": {
"name": "curl-8.14.1-150600.4.34.1.ppc64le",
"product_id": "curl-8.14.1-150600.4.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"product": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"product_id": "libcurl-devel-8.14.1-150600.4.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150600.4.34.1.ppc64le",
"product": {
"name": "libcurl-mini4-8.14.1-150600.4.34.1.ppc64le",
"product_id": "libcurl-mini4-8.14.1-150600.4.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150600.4.34.1.ppc64le",
"product": {
"name": "libcurl4-8.14.1-150600.4.34.1.ppc64le",
"product_id": "libcurl4-8.14.1-150600.4.34.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150600.4.34.1.s390x",
"product": {
"name": "curl-8.14.1-150600.4.34.1.s390x",
"product_id": "curl-8.14.1-150600.4.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150600.4.34.1.s390x",
"product": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.s390x",
"product_id": "libcurl-devel-8.14.1-150600.4.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150600.4.34.1.s390x",
"product": {
"name": "libcurl-mini4-8.14.1-150600.4.34.1.s390x",
"product_id": "libcurl-mini4-8.14.1-150600.4.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150600.4.34.1.s390x",
"product": {
"name": "libcurl4-8.14.1-150600.4.34.1.s390x",
"product_id": "libcurl4-8.14.1-150600.4.34.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "curl-8.14.1-150600.4.34.1.x86_64",
"product_id": "curl-8.14.1-150600.4.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"product_id": "libcurl-devel-8.14.1-150600.4.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"product_id": "libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "libcurl-mini4-8.14.1-150600.4.34.1.x86_64",
"product_id": "libcurl-mini4-8.14.1-150600.4.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "libcurl4-8.14.1-150600.4.34.1.x86_64",
"product_id": "libcurl4-8.14.1-150600.4.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"product_id": "libcurl4-32bit-8.14.1-150600.4.34.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150600.4.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64"
},
"product_reference": "curl-8.14.1-150600.4.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150600.4.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le"
},
"product_reference": "curl-8.14.1-150600.4.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150600.4.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x"
},
"product_reference": "curl-8.14.1-150600.4.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150600.4.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64"
},
"product_reference": "curl-8.14.1-150600.4.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64"
},
"product_reference": "libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le"
},
"product_reference": "libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x"
},
"product_reference": "libcurl-devel-8.14.1-150600.4.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64"
},
"product_reference": "libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64"
},
"product_reference": "libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150600.4.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-150600.4.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150600.4.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le"
},
"product_reference": "libcurl4-8.14.1-150600.4.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150600.4.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x"
},
"product_reference": "libcurl4-8.14.1-150600.4.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150600.4.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-150600.4.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.14.1-150600.4.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64"
},
"product_reference": "libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:15Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:15Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:15Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:15Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
SUSE-SU-2026:0051-1
Vulnerability from csaf_suse - Published: 2026-01-07 09:28 - Updated: 2026-01-07 09:28| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\n- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).\n- CVE-2025-14819: libssh global knownhost override (bsc#1255732).\n- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).\n- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-51,SUSE-SUSE-MicroOS-5.2-2026-51",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0051-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0051-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260051-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0051-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023697.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE Bug 1255734",
"url": "https://bugzilla.suse.com/1255734"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-01-07T09:28:27Z",
"generator": {
"date": "2026-01-07T09:28:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0051-1",
"initial_release_date": "2026-01-07T09:28:27Z",
"revision_history": [
{
"date": "2026-01-07T09:28:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150200.4.97.1.aarch64",
"product": {
"name": "curl-8.14.1-150200.4.97.1.aarch64",
"product_id": "curl-8.14.1-150200.4.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150200.4.97.1.aarch64",
"product": {
"name": "libcurl-devel-8.14.1-150200.4.97.1.aarch64",
"product_id": "libcurl-devel-8.14.1-150200.4.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150200.4.97.1.aarch64",
"product": {
"name": "libcurl-mini4-8.14.1-150200.4.97.1.aarch64",
"product_id": "libcurl-mini4-8.14.1-150200.4.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150200.4.97.1.aarch64",
"product": {
"name": "libcurl4-8.14.1-150200.4.97.1.aarch64",
"product_id": "libcurl4-8.14.1-150200.4.97.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libcurl-devel-64bit-8.14.1-150200.4.97.1.aarch64_ilp32",
"product": {
"name": "libcurl-devel-64bit-8.14.1-150200.4.97.1.aarch64_ilp32",
"product_id": "libcurl-devel-64bit-8.14.1-150200.4.97.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libcurl4-64bit-8.14.1-150200.4.97.1.aarch64_ilp32",
"product": {
"name": "libcurl4-64bit-8.14.1-150200.4.97.1.aarch64_ilp32",
"product_id": "libcurl4-64bit-8.14.1-150200.4.97.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150200.4.97.1.i586",
"product": {
"name": "curl-8.14.1-150200.4.97.1.i586",
"product_id": "curl-8.14.1-150200.4.97.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150200.4.97.1.i586",
"product": {
"name": "libcurl-devel-8.14.1-150200.4.97.1.i586",
"product_id": "libcurl-devel-8.14.1-150200.4.97.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150200.4.97.1.i586",
"product": {
"name": "libcurl-mini4-8.14.1-150200.4.97.1.i586",
"product_id": "libcurl-mini4-8.14.1-150200.4.97.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150200.4.97.1.i586",
"product": {
"name": "libcurl4-8.14.1-150200.4.97.1.i586",
"product_id": "libcurl4-8.14.1-150200.4.97.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-fish-completion-8.14.1-150200.4.97.1.noarch",
"product": {
"name": "curl-fish-completion-8.14.1-150200.4.97.1.noarch",
"product_id": "curl-fish-completion-8.14.1-150200.4.97.1.noarch"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.14.1-150200.4.97.1.noarch",
"product": {
"name": "curl-zsh-completion-8.14.1-150200.4.97.1.noarch",
"product_id": "curl-zsh-completion-8.14.1-150200.4.97.1.noarch"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.14.1-150200.4.97.1.noarch",
"product": {
"name": "libcurl-devel-doc-8.14.1-150200.4.97.1.noarch",
"product_id": "libcurl-devel-doc-8.14.1-150200.4.97.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150200.4.97.1.ppc64le",
"product": {
"name": "curl-8.14.1-150200.4.97.1.ppc64le",
"product_id": "curl-8.14.1-150200.4.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150200.4.97.1.ppc64le",
"product": {
"name": "libcurl-devel-8.14.1-150200.4.97.1.ppc64le",
"product_id": "libcurl-devel-8.14.1-150200.4.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150200.4.97.1.ppc64le",
"product": {
"name": "libcurl-mini4-8.14.1-150200.4.97.1.ppc64le",
"product_id": "libcurl-mini4-8.14.1-150200.4.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150200.4.97.1.ppc64le",
"product": {
"name": "libcurl4-8.14.1-150200.4.97.1.ppc64le",
"product_id": "libcurl4-8.14.1-150200.4.97.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150200.4.97.1.s390x",
"product": {
"name": "curl-8.14.1-150200.4.97.1.s390x",
"product_id": "curl-8.14.1-150200.4.97.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150200.4.97.1.s390x",
"product": {
"name": "libcurl-devel-8.14.1-150200.4.97.1.s390x",
"product_id": "libcurl-devel-8.14.1-150200.4.97.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150200.4.97.1.s390x",
"product": {
"name": "libcurl-mini4-8.14.1-150200.4.97.1.s390x",
"product_id": "libcurl-mini4-8.14.1-150200.4.97.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150200.4.97.1.s390x",
"product": {
"name": "libcurl4-8.14.1-150200.4.97.1.s390x",
"product_id": "libcurl4-8.14.1-150200.4.97.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150200.4.97.1.x86_64",
"product": {
"name": "curl-8.14.1-150200.4.97.1.x86_64",
"product_id": "curl-8.14.1-150200.4.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150200.4.97.1.x86_64",
"product": {
"name": "libcurl-devel-8.14.1-150200.4.97.1.x86_64",
"product_id": "libcurl-devel-8.14.1-150200.4.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.14.1-150200.4.97.1.x86_64",
"product": {
"name": "libcurl-devel-32bit-8.14.1-150200.4.97.1.x86_64",
"product_id": "libcurl-devel-32bit-8.14.1-150200.4.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150200.4.97.1.x86_64",
"product": {
"name": "libcurl-mini4-8.14.1-150200.4.97.1.x86_64",
"product_id": "libcurl-mini4-8.14.1-150200.4.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150200.4.97.1.x86_64",
"product": {
"name": "libcurl4-8.14.1-150200.4.97.1.x86_64",
"product_id": "libcurl4-8.14.1-150200.4.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.14.1-150200.4.97.1.x86_64",
"product": {
"name": "libcurl4-32bit-8.14.1-150200.4.97.1.x86_64",
"product_id": "libcurl4-32bit-8.14.1-150200.4.97.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150200.4.97.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64"
},
"product_reference": "curl-8.14.1-150200.4.97.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150200.4.97.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x"
},
"product_reference": "curl-8.14.1-150200.4.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150200.4.97.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64"
},
"product_reference": "curl-8.14.1-150200.4.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150200.4.97.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-150200.4.97.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150200.4.97.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x"
},
"product_reference": "libcurl4-8.14.1-150200.4.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150200.4.97.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-150200.4.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:27Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:27Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:27Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:27Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
SUSE-SU-2026:0052-1
Vulnerability from csaf_suse - Published: 2026-01-07 09:28 - Updated: 2026-01-07 09:28| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\n- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).\n- CVE-2025-14819: libssh global knownhost override (bsc#1255732).\n- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).\n- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-52,SUSE-SLE-Module-Basesystem-15-SP7-2026-52",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0052-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0052-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260052-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0052-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023696.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE Bug 1255734",
"url": "https://bugzilla.suse.com/1255734"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-01-07T09:28:37Z",
"generator": {
"date": "2026-01-07T09:28:37Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0052-1",
"initial_release_date": "2026-01-07T09:28:37Z",
"revision_history": [
{
"date": "2026-01-07T09:28:37Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150700.7.8.1.aarch64",
"product": {
"name": "curl-8.14.1-150700.7.8.1.aarch64",
"product_id": "curl-8.14.1-150700.7.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"product": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"product_id": "libcurl-devel-8.14.1-150700.7.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150700.7.8.1.aarch64",
"product": {
"name": "libcurl-mini4-8.14.1-150700.7.8.1.aarch64",
"product_id": "libcurl-mini4-8.14.1-150700.7.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150700.7.8.1.aarch64",
"product": {
"name": "libcurl4-8.14.1-150700.7.8.1.aarch64",
"product_id": "libcurl4-8.14.1-150700.7.8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libcurl-devel-64bit-8.14.1-150700.7.8.1.aarch64_ilp32",
"product": {
"name": "libcurl-devel-64bit-8.14.1-150700.7.8.1.aarch64_ilp32",
"product_id": "libcurl-devel-64bit-8.14.1-150700.7.8.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libcurl4-64bit-8.14.1-150700.7.8.1.aarch64_ilp32",
"product": {
"name": "libcurl4-64bit-8.14.1-150700.7.8.1.aarch64_ilp32",
"product_id": "libcurl4-64bit-8.14.1-150700.7.8.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150700.7.8.1.i586",
"product": {
"name": "curl-8.14.1-150700.7.8.1.i586",
"product_id": "curl-8.14.1-150700.7.8.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150700.7.8.1.i586",
"product": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.i586",
"product_id": "libcurl-devel-8.14.1-150700.7.8.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150700.7.8.1.i586",
"product": {
"name": "libcurl-mini4-8.14.1-150700.7.8.1.i586",
"product_id": "libcurl-mini4-8.14.1-150700.7.8.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150700.7.8.1.i586",
"product": {
"name": "libcurl4-8.14.1-150700.7.8.1.i586",
"product_id": "libcurl4-8.14.1-150700.7.8.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-fish-completion-8.14.1-150700.7.8.1.noarch",
"product": {
"name": "curl-fish-completion-8.14.1-150700.7.8.1.noarch",
"product_id": "curl-fish-completion-8.14.1-150700.7.8.1.noarch"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.14.1-150700.7.8.1.noarch",
"product": {
"name": "curl-zsh-completion-8.14.1-150700.7.8.1.noarch",
"product_id": "curl-zsh-completion-8.14.1-150700.7.8.1.noarch"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.14.1-150700.7.8.1.noarch",
"product": {
"name": "libcurl-devel-doc-8.14.1-150700.7.8.1.noarch",
"product_id": "libcurl-devel-doc-8.14.1-150700.7.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150700.7.8.1.ppc64le",
"product": {
"name": "curl-8.14.1-150700.7.8.1.ppc64le",
"product_id": "curl-8.14.1-150700.7.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"product": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"product_id": "libcurl-devel-8.14.1-150700.7.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150700.7.8.1.ppc64le",
"product": {
"name": "libcurl-mini4-8.14.1-150700.7.8.1.ppc64le",
"product_id": "libcurl-mini4-8.14.1-150700.7.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150700.7.8.1.ppc64le",
"product": {
"name": "libcurl4-8.14.1-150700.7.8.1.ppc64le",
"product_id": "libcurl4-8.14.1-150700.7.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150700.7.8.1.s390x",
"product": {
"name": "curl-8.14.1-150700.7.8.1.s390x",
"product_id": "curl-8.14.1-150700.7.8.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150700.7.8.1.s390x",
"product": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.s390x",
"product_id": "libcurl-devel-8.14.1-150700.7.8.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150700.7.8.1.s390x",
"product": {
"name": "libcurl-mini4-8.14.1-150700.7.8.1.s390x",
"product_id": "libcurl-mini4-8.14.1-150700.7.8.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150700.7.8.1.s390x",
"product": {
"name": "libcurl4-8.14.1-150700.7.8.1.s390x",
"product_id": "libcurl4-8.14.1-150700.7.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150700.7.8.1.x86_64",
"product": {
"name": "curl-8.14.1-150700.7.8.1.x86_64",
"product_id": "curl-8.14.1-150700.7.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"product": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"product_id": "libcurl-devel-8.14.1-150700.7.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.14.1-150700.7.8.1.x86_64",
"product": {
"name": "libcurl-devel-32bit-8.14.1-150700.7.8.1.x86_64",
"product_id": "libcurl-devel-32bit-8.14.1-150700.7.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150700.7.8.1.x86_64",
"product": {
"name": "libcurl-mini4-8.14.1-150700.7.8.1.x86_64",
"product_id": "libcurl-mini4-8.14.1-150700.7.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150700.7.8.1.x86_64",
"product": {
"name": "libcurl4-8.14.1-150700.7.8.1.x86_64",
"product_id": "libcurl4-8.14.1-150700.7.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"product": {
"name": "libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"product_id": "libcurl4-32bit-8.14.1-150700.7.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150700.7.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64"
},
"product_reference": "curl-8.14.1-150700.7.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150700.7.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le"
},
"product_reference": "curl-8.14.1-150700.7.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150700.7.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x"
},
"product_reference": "curl-8.14.1-150700.7.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150700.7.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64"
},
"product_reference": "curl-8.14.1-150700.7.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64"
},
"product_reference": "libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le"
},
"product_reference": "libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x"
},
"product_reference": "libcurl-devel-8.14.1-150700.7.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64"
},
"product_reference": "libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150700.7.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-150700.7.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150700.7.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le"
},
"product_reference": "libcurl4-8.14.1-150700.7.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150700.7.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x"
},
"product_reference": "libcurl4-8.14.1-150700.7.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150700.7.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-150700.7.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.14.1-150700.7.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64"
},
"product_reference": "libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:37Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:37Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:37Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:37Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
SUSE-SU-2026:0066-1
Vulnerability from csaf_suse - Published: 2026-01-08 12:21 - Updated: 2026-01-08 12:21| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\n - CVE-2025-14524: Fixed bearer token leak on cross-protocol redirect (bsc#1255731)\n - CVE-2025-15079: Fixed unknown host connection acceptance when set in the global knownhostsfile (bsc#1255733)\n - CVE-2025-14819: Fixed issue where alteration of CURLSSLOPT_NO_PARTIALCHAIN could\n accidentally lead to CA cache reuse for which partial chain was reversed (bsc#1255732)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-66,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-66",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0066-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0066-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260066-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0066-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023711.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-01-08T12:21:35Z",
"generator": {
"date": "2026-01-08T12:21:35Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0066-1",
"initial_release_date": "2026-01-08T12:21:35Z",
"revision_history": [
{
"date": "2026-01-08T12:21:35Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.0.1-11.111.1.aarch64",
"product": {
"name": "curl-8.0.1-11.111.1.aarch64",
"product_id": "curl-8.0.1-11.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.0.1-11.111.1.aarch64",
"product": {
"name": "libcurl-devel-8.0.1-11.111.1.aarch64",
"product_id": "libcurl-devel-8.0.1-11.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.0.1-11.111.1.aarch64",
"product": {
"name": "libcurl4-8.0.1-11.111.1.aarch64",
"product_id": "libcurl4-8.0.1-11.111.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libcurl-devel-64bit-8.0.1-11.111.1.aarch64_ilp32",
"product": {
"name": "libcurl-devel-64bit-8.0.1-11.111.1.aarch64_ilp32",
"product_id": "libcurl-devel-64bit-8.0.1-11.111.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libcurl4-64bit-8.0.1-11.111.1.aarch64_ilp32",
"product": {
"name": "libcurl4-64bit-8.0.1-11.111.1.aarch64_ilp32",
"product_id": "libcurl4-64bit-8.0.1-11.111.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.0.1-11.111.1.i586",
"product": {
"name": "curl-8.0.1-11.111.1.i586",
"product_id": "curl-8.0.1-11.111.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.0.1-11.111.1.i586",
"product": {
"name": "libcurl-devel-8.0.1-11.111.1.i586",
"product_id": "libcurl-devel-8.0.1-11.111.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl4-8.0.1-11.111.1.i586",
"product": {
"name": "libcurl4-8.0.1-11.111.1.i586",
"product_id": "libcurl4-8.0.1-11.111.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.0.1-11.111.1.ppc64le",
"product": {
"name": "curl-8.0.1-11.111.1.ppc64le",
"product_id": "curl-8.0.1-11.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.0.1-11.111.1.ppc64le",
"product": {
"name": "libcurl-devel-8.0.1-11.111.1.ppc64le",
"product_id": "libcurl-devel-8.0.1-11.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.0.1-11.111.1.ppc64le",
"product": {
"name": "libcurl4-8.0.1-11.111.1.ppc64le",
"product_id": "libcurl4-8.0.1-11.111.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.0.1-11.111.1.s390",
"product": {
"name": "curl-8.0.1-11.111.1.s390",
"product_id": "curl-8.0.1-11.111.1.s390"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.0.1-11.111.1.s390",
"product": {
"name": "libcurl-devel-8.0.1-11.111.1.s390",
"product_id": "libcurl-devel-8.0.1-11.111.1.s390"
}
},
{
"category": "product_version",
"name": "libcurl4-8.0.1-11.111.1.s390",
"product": {
"name": "libcurl4-8.0.1-11.111.1.s390",
"product_id": "libcurl4-8.0.1-11.111.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.0.1-11.111.1.s390x",
"product": {
"name": "curl-8.0.1-11.111.1.s390x",
"product_id": "curl-8.0.1-11.111.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.0.1-11.111.1.s390x",
"product": {
"name": "libcurl-devel-8.0.1-11.111.1.s390x",
"product_id": "libcurl-devel-8.0.1-11.111.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.0.1-11.111.1.s390x",
"product": {
"name": "libcurl-devel-32bit-8.0.1-11.111.1.s390x",
"product_id": "libcurl-devel-32bit-8.0.1-11.111.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.0.1-11.111.1.s390x",
"product": {
"name": "libcurl4-8.0.1-11.111.1.s390x",
"product_id": "libcurl4-8.0.1-11.111.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.0.1-11.111.1.s390x",
"product": {
"name": "libcurl4-32bit-8.0.1-11.111.1.s390x",
"product_id": "libcurl4-32bit-8.0.1-11.111.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.0.1-11.111.1.x86_64",
"product": {
"name": "curl-8.0.1-11.111.1.x86_64",
"product_id": "curl-8.0.1-11.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.0.1-11.111.1.x86_64",
"product": {
"name": "libcurl-devel-8.0.1-11.111.1.x86_64",
"product_id": "libcurl-devel-8.0.1-11.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.0.1-11.111.1.x86_64",
"product": {
"name": "libcurl-devel-32bit-8.0.1-11.111.1.x86_64",
"product_id": "libcurl-devel-32bit-8.0.1-11.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.0.1-11.111.1.x86_64",
"product": {
"name": "libcurl4-8.0.1-11.111.1.x86_64",
"product_id": "libcurl4-8.0.1-11.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.0.1-11.111.1.x86_64",
"product": {
"name": "libcurl4-32bit-8.0.1-11.111.1.x86_64",
"product_id": "libcurl4-32bit-8.0.1-11.111.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.0.1-11.111.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64"
},
"product_reference": "curl-8.0.1-11.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.0.1-11.111.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64"
},
"product_reference": "libcurl-devel-8.0.1-11.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.0.1-11.111.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
},
"product_reference": "libcurl4-8.0.1-11.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.0.1-11.111.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64"
},
"product_reference": "libcurl4-32bit-8.0.1-11.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T12:21:35Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T12:21:35Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T12:21:35Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.