Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-14819 (GCVE-0-2025-14819)
Vulnerability from cvelistv5 – Published: 2026-01-08 10:07 – Updated: 2026-01-08 15:02| Vendor | Product | Version | ||
|---|---|---|---|---|
| curl | curl |
Affected:
8.17.0 , ≤ 8.17.0
(semver)
Affected: 8.16.0 , ≤ 8.16.0 (semver) Affected: 8.15.0 , ≤ 8.15.0 (semver) Affected: 8.14.1 , ≤ 8.14.1 (semver) Affected: 8.14.0 , ≤ 8.14.0 (semver) Affected: 8.13.0 , ≤ 8.13.0 (semver) Affected: 8.12.1 , ≤ 8.12.1 (semver) Affected: 8.12.0 , ≤ 8.12.0 (semver) Affected: 8.11.1 , ≤ 8.11.1 (semver) Affected: 8.11.0 , ≤ 8.11.0 (semver) Affected: 8.10.1 , ≤ 8.10.1 (semver) Affected: 8.10.0 , ≤ 8.10.0 (semver) Affected: 8.9.1 , ≤ 8.9.1 (semver) Affected: 8.9.0 , ≤ 8.9.0 (semver) Affected: 8.8.0 , ≤ 8.8.0 (semver) Affected: 8.7.1 , ≤ 8.7.1 (semver) Affected: 8.7.0 , ≤ 8.7.0 (semver) Affected: 8.6.0 , ≤ 8.6.0 (semver) Affected: 8.5.0 , ≤ 8.5.0 (semver) Affected: 8.4.0 , ≤ 8.4.0 (semver) Affected: 8.3.0 , ≤ 8.3.0 (semver) Affected: 8.2.1 , ≤ 8.2.1 (semver) Affected: 8.2.0 , ≤ 8.2.0 (semver) Affected: 8.1.2 , ≤ 8.1.2 (semver) Affected: 8.1.1 , ≤ 8.1.1 (semver) Affected: 8.1.0 , ≤ 8.1.0 (semver) Affected: 8.0.1 , ≤ 8.0.1 (semver) Affected: 8.0.0 , ≤ 8.0.0 (semver) Affected: 7.88.1 , ≤ 7.88.1 (semver) Affected: 7.88.0 , ≤ 7.88.0 (semver) Affected: 7.87.0 , ≤ 7.87.0 (semver) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2026-01-08T11:06:19.910Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2026/01/07/5"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-14819",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-08T15:00:02.949618Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-295",
"description": "CWE-295 Improper Certificate Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-08T15:02:04.303Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "curl",
"vendor": "curl",
"versions": [
{
"lessThanOrEqual": "8.17.0",
"status": "affected",
"version": "8.17.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.16.0",
"status": "affected",
"version": "8.16.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.15.0",
"status": "affected",
"version": "8.15.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.14.1",
"status": "affected",
"version": "8.14.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.14.0",
"status": "affected",
"version": "8.14.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.13.0",
"status": "affected",
"version": "8.13.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.12.1",
"status": "affected",
"version": "8.12.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.12.0",
"status": "affected",
"version": "8.12.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.11.1",
"status": "affected",
"version": "8.11.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.11.0",
"status": "affected",
"version": "8.11.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.10.1",
"status": "affected",
"version": "8.10.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.10.0",
"status": "affected",
"version": "8.10.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.9.1",
"status": "affected",
"version": "8.9.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.9.0",
"status": "affected",
"version": "8.9.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.8.0",
"status": "affected",
"version": "8.8.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.7.1",
"status": "affected",
"version": "8.7.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.7.0",
"status": "affected",
"version": "8.7.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.6.0",
"status": "affected",
"version": "8.6.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.5.0",
"status": "affected",
"version": "8.5.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.4.0",
"status": "affected",
"version": "8.4.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.3.0",
"status": "affected",
"version": "8.3.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.2.1",
"status": "affected",
"version": "8.2.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.2.0",
"status": "affected",
"version": "8.2.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.1.2",
"status": "affected",
"version": "8.1.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.1.1",
"status": "affected",
"version": "8.1.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.1.0",
"status": "affected",
"version": "8.1.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.0.1",
"status": "affected",
"version": "8.0.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.0.0",
"status": "affected",
"version": "8.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.88.1",
"status": "affected",
"version": "7.88.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.88.0",
"status": "affected",
"version": "7.88.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.87.0",
"status": "affected",
"version": "7.87.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Stanislav Fort (Aisle Research)"
},
{
"lang": "en",
"type": "remediation developer",
"value": "Daniel Stenberg"
}
],
"descriptions": [
{
"lang": "en",
"value": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-295 Improper Certificate Validation",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-08T10:07:54.408Z",
"orgId": "2499f714-1537-4658-8207-48ae4bb9eae9",
"shortName": "curl"
},
"references": [
{
"name": "json",
"url": "https://curl.se/docs/CVE-2025-14819.json"
},
{
"name": "www",
"url": "https://curl.se/docs/CVE-2025-14819.html"
}
],
"title": "OpenSSL partial chain store policy bypass"
}
},
"cveMetadata": {
"assignerOrgId": "2499f714-1537-4658-8207-48ae4bb9eae9",
"assignerShortName": "curl",
"cveId": "CVE-2025-14819",
"datePublished": "2026-01-08T10:07:54.408Z",
"dateReserved": "2025-12-17T09:55:27.969Z",
"dateUpdated": "2026-01-08T15:02:04.303Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-14819",
"date": "2026-04-22",
"epss": "0.00045",
"percentile": "0.13901"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-14819\",\"sourceIdentifier\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"published\":\"2026-01-08T10:15:46.730\",\"lastModified\":\"2026-01-20T14:51:26.263\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"When doing TLS related transfers with reused easy or multi handles and\\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\\nreuse a CA store cached in memory for which the partial chain option was\\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\\nlibcurl find and accept a trust chain that it otherwise would not.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.87.0\",\"versionEndExcluding\":\"8.18.0\",\"matchCriteriaId\":\"83978599-3111-4F13-BFAE-1B0423D8A75F\"}]}]}],\"references\":[{\"url\":\"https://curl.se/docs/CVE-2025-14819.html\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Vendor Advisory\",\"Mitigation\",\"Patch\"]},{\"url\":\"https://curl.se/docs/CVE-2025-14819.json\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2026/01/07/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\",\"Mitigation\",\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2026/01/07/5\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2026-01-08T11:06:19.910Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-14819\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-08T15:00:02.949618Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-295\", \"description\": \"CWE-295 Improper Certificate Validation\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-08T15:00:27.401Z\"}}], \"cna\": {\"title\": \"OpenSSL partial chain store policy bypass\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Stanislav Fort (Aisle Research)\"}, {\"lang\": \"en\", \"type\": \"remediation developer\", \"value\": \"Daniel Stenberg\"}], \"affected\": [{\"vendor\": \"curl\", \"product\": \"curl\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.17.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.17.0\"}, {\"status\": \"affected\", \"version\": \"8.16.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.16.0\"}, {\"status\": \"affected\", \"version\": \"8.15.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.15.0\"}, {\"status\": \"affected\", \"version\": \"8.14.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.14.1\"}, {\"status\": \"affected\", \"version\": \"8.14.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.14.0\"}, {\"status\": \"affected\", \"version\": \"8.13.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.13.0\"}, {\"status\": \"affected\", \"version\": \"8.12.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.12.1\"}, {\"status\": \"affected\", \"version\": \"8.12.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.12.0\"}, {\"status\": \"affected\", \"version\": \"8.11.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.11.1\"}, {\"status\": \"affected\", \"version\": \"8.11.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.11.0\"}, {\"status\": \"affected\", \"version\": \"8.10.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.10.1\"}, {\"status\": \"affected\", \"version\": \"8.10.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.10.0\"}, {\"status\": \"affected\", \"version\": \"8.9.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.9.1\"}, {\"status\": \"affected\", \"version\": \"8.9.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.9.0\"}, {\"status\": \"affected\", \"version\": \"8.8.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.8.0\"}, {\"status\": \"affected\", \"version\": \"8.7.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.7.1\"}, {\"status\": \"affected\", \"version\": \"8.7.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.7.0\"}, {\"status\": \"affected\", \"version\": \"8.6.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.6.0\"}, {\"status\": \"affected\", \"version\": \"8.5.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.5.0\"}, {\"status\": \"affected\", \"version\": \"8.4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.4.0\"}, {\"status\": \"affected\", \"version\": \"8.3.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.3.0\"}, {\"status\": \"affected\", \"version\": \"8.2.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.2.1\"}, {\"status\": \"affected\", \"version\": \"8.2.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.2.0\"}, {\"status\": \"affected\", \"version\": \"8.1.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1.2\"}, {\"status\": \"affected\", \"version\": \"8.1.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1.1\"}, {\"status\": \"affected\", \"version\": \"8.1.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1.0\"}, {\"status\": \"affected\", \"version\": \"8.0.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.0.1\"}, {\"status\": \"affected\", \"version\": \"8.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.0.0\"}, {\"status\": \"affected\", \"version\": \"7.88.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.88.1\"}, {\"status\": \"affected\", \"version\": \"7.88.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.88.0\"}, {\"status\": \"affected\", \"version\": \"7.87.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.87.0\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://curl.se/docs/CVE-2025-14819.json\", \"name\": \"json\"}, {\"url\": \"https://curl.se/docs/CVE-2025-14819.html\", \"name\": \"www\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"When doing TLS related transfers with reused easy or multi handles and\\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\\nreuse a CA store cached in memory for which the partial chain option was\\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\\nlibcurl find and accept a trust chain that it otherwise would not.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-295 Improper Certificate Validation\"}]}], \"providerMetadata\": {\"orgId\": \"2499f714-1537-4658-8207-48ae4bb9eae9\", \"shortName\": \"curl\", \"dateUpdated\": \"2026-01-08T10:07:54.408Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-14819\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-08T15:02:04.303Z\", \"dateReserved\": \"2025-12-17T09:55:27.969Z\", \"assignerOrgId\": \"2499f714-1537-4658-8207-48ae4bb9eae9\", \"datePublished\": \"2026-01-08T10:07:54.408Z\", \"assignerShortName\": \"curl\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:6893
Vulnerability from csaf_redhat - Published: 2026-04-07 15:43 - Updated: 2026-04-19 19:37An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.
A flaw was found in curl. The use of a predictable WebSocket mask pattern allows a malicious server to induce traffic that an intermediary proxy (whether configured or transparent) will misinterpret as a standard HTTP request. This confusion leads to a cache poisoning attack, where the proxy stores the server's malicious content and serves it to all users of that proxy.
curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. As the wolfSSH backend was documented as incomplete and fail tests, it is not expected that many users execute this code in production.
A flaw was found in curl. When configured to use public key pinning with QUIC connections and GnuTLS, and with standard certificate verification explicitly disabled, curl could bypass the intended public key check. This oversight allows a malicious server to impersonate a legitimate one, potentially leading to unauthorized access or information disclosure due to a failure in verifying the server's identity.
A flaw was found in curl. When performing multi-threaded LDAPS (Lightweight Directory Access Protocol Secure) transfers, changes to Transport Layer Security (TLS) options in one thread could inadvertently apply globally, affecting other concurrent transfers. This could lead to unintended security posture changes, such as disabling certificate verification for other threads. This vulnerability can result in a security bypass, where expected security checks are not performed.
A flaw was found in curl. When an OAuth2 (Open Authorization) bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a different scheme like IMAP, LDAP, POP3, or SMTP, curl might incorrectly pass the bearer token to the new target host. This could lead to information disclosure, where sensitive authentication tokens are exposed to unintended recipients.
A flaw was found in libcurl. When handling secure connections (TLS) and reusing connection settings, libcurl could incorrectly apply a cached security setting related to certificate chain validation. This could allow libcurl to accept a server's security certificate that it should have otherwise rejected, potentially compromising the integrity of the secure connection.
A flaw was found in curl. When performing SSH-based transfers using SCP or SFTP, libcurl could mistakenly connect to hosts not listed in the user-specified knownhosts file. This occurs if the host is present in the libssh global knownhosts file, effectively bypassing the intended host verification. This could allow a remote attacker to connect to an untrusted host, potentially leading to information disclosure or man-in-the-middle attacks.
A flaw was found in libcurl. When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.
A flaw was found in curl. When an application uses libcurl to make multiple Negotiate-authenticated HTTP or HTTPS requests to the same server with different credentials, libcurl may incorrectly reuse an existing connection. This logical error can cause a subsequent request to be sent using the authentication of a previous user, leading to an authentication bypass.
A flaw was found in curl. When an OAuth2 bearer token is used for an HTTP(S) transfer that redirects to a second URL, curl could unintentionally leak the token. This occurs if the second hostname has entries in the `.netrc` file, allowing the bearer token intended for the first host to be sent to the redirected host. This information disclosure could allow an attacker to gain unauthorized access.
A flaw was found in curl. This vulnerability allows curl to wrongly reuse an existing HTTP proxy connection when performing a CONNECT request to a server, even if the new request uses different authentication credentials for the HTTP proxy. This improper connection reuse could lead to an attacker gaining unauthorized access to resources or information intended for a different user.
A flaw was found in curl. When handling a second Server Message Block (SMB) request to the same host, curl incorrectly accesses memory that has already been freed. This memory corruption vulnerability, known as a use-after-free, could allow a remote attacker to potentially execute arbitrary code or cause a denial of service.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:\n\ncurl:\n * curl-8.19.0-3.hum1 (aarch64, x86_64)\n * libcurl-8.19.0-3.hum1 (aarch64, x86_64)\n * libcurl-devel-8.19.0-3.hum1 (aarch64, x86_64)\n * libcurl-minimal-8.19.0-3.hum1 (aarch64, x86_64)\n * curl-8.19.0-3.hum1.src (source)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:6893",
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9086",
"url": "https://access.redhat.com/security/cve/CVE-2025-9086"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-10148",
"url": "https://access.redhat.com/security/cve/CVE-2025-10148"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-10966",
"url": "https://access.redhat.com/security/cve/CVE-2025-10966"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15224",
"url": "https://access.redhat.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15079",
"url": "https://access.redhat.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14819",
"url": "https://access.redhat.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14524",
"url": "https://access.redhat.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13034",
"url": "https://access.redhat.com/security/cve/CVE-2025-13034"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-3805",
"url": "https://access.redhat.com/security/cve/CVE-2026-3805"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-3783",
"url": "https://access.redhat.com/security/cve/CVE-2026-3783"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-3784",
"url": "https://access.redhat.com/security/cve/CVE-2026-3784"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-1965",
"url": "https://access.redhat.com/security/cve/CVE-2026-1965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14017",
"url": "https://access.redhat.com/security/cve/CVE-2025-14017"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_6893.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-04-19T19:37:47+00:00",
"generator": {
"date": "2026-04-19T19:37:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:6893",
"initial_release_date": "2026-04-07T15:43:21+00:00",
"revision_history": [
{
"date": "2026-04-07T15:43:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-18T20:01:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-19T19:37:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-main@aarch64",
"product": {
"name": "curl-main@aarch64",
"product_id": "curl-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/curl@8.19.0-3.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-main@src",
"product": {
"name": "curl-main@src",
"product_id": "curl-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/curl@8.19.0-3.hum1?arch=source\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-main@x86_64",
"product": {
"name": "curl-main@x86_64",
"product_id": "curl-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/curl@8.19.0-3.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:curl-main@aarch64"
},
"product_reference": "curl-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:curl-main@src"
},
"product_reference": "curl-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:curl-main@x86_64"
},
"product_reference": "curl-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-9086",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-09-12T06:01:02.244669+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394750"
}
],
"notes": [
{
"category": "description",
"text": "An out of bounds read flaw has been discovered in the curl project. Under specific conditions the path comparison logic makes curl read outside a heap buffer boundary. This bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libcurl: Curl out of bounds read for cookie path",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9086"
},
{
"category": "external",
"summary": "RHBZ#2394750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-9086.html",
"url": "https://curl.se/docs/CVE-2025-9086.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-9086.json",
"url": "https://curl.se/docs/CVE-2025-9086.json"
},
{
"category": "external",
"summary": "https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6",
"url": "https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3294999",
"url": "https://hackerone.com/reports/3294999"
}
],
"release_date": "2025-09-12T05:10:03.815000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: libcurl: Curl out of bounds read for cookie path"
},
{
"cve": "CVE-2025-10148",
"cwe": {
"id": "CWE-340",
"name": "Generation of Predictable Numbers or Identifiers"
},
"discovery_date": "2025-09-12T06:00:58.790751+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394749"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. The use of a predictable WebSocket mask pattern allows a malicious server to induce traffic that an intermediary proxy (whether configured or transparent) will misinterpret as a standard HTTP request. This confusion leads to a cache poisoning attack, where the proxy stores the server\u0027s malicious content and serves it to all users of that proxy.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: predictable WebSocket mask",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, a curl application must be communicating through a defective proxy that confuses a WebSocket for HTTP traffic. Additionally, this flaw requires the traffic to be done using clear text HTTP / WebSocket (ws://) and not over TLS (wss://).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-10148"
},
{
"category": "external",
"summary": "RHBZ#2394749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394749"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-10148",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10148"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-10148.html",
"url": "https://curl.se/docs/CVE-2025-10148.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-10148.json",
"url": "https://curl.se/docs/CVE-2025-10148.json"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3330839",
"url": "https://hackerone.com/reports/3330839"
}
],
"release_date": "2025-09-12T05:10:37.469000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: predictable WebSocket mask"
},
{
"cve": "CVE-2025-10966",
"cwe": {
"id": "CWE-322",
"name": "Key Exchange without Entity Authentication"
},
"discovery_date": "2025-11-07T08:00:51.044355+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2413308"
}
],
"notes": [
{
"category": "description",
"text": "curl\u0027s code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. As the wolfSSH backend was documented as incomplete and fail tests, it is not expected that many users execute this code in production.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Curl missing SFTP host verification with wolfSSH backend",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability doesn\u0027t affect any supported Red Hat product. This flaw affects only curl when built with wolfSSH backend support, meanwhile for Red Hat Enterprise Linux and other Red Hat products the default SSH backend being use is libssh. It\u0027s not possible to change this configuration in runtime, as it\u0027s a build time only configuration.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-10966"
},
{
"category": "external",
"summary": "RHBZ#2413308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413308"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-10966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10966"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/11/05/2",
"url": "http://www.openwall.com/lists/oss-security/2025/11/05/2"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-10966.html",
"url": "https://curl.se/docs/CVE-2025-10966.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-10966.json",
"url": "https://curl.se/docs/CVE-2025-10966.json"
},
{
"category": "external",
"summary": "https://github.com/curl/curl/commit/b011e3fcfb06d6c027859",
"url": "https://github.com/curl/curl/commit/b011e3fcfb06d6c027859"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3355218",
"url": "https://hackerone.com/reports/3355218"
}
],
"release_date": "2025-11-07T07:26:30.351000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: Curl missing SFTP host verification with wolfSSH backend"
},
{
"cve": "CVE-2025-13034",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2025-12-31T03:46:57.230000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When configured to use public key pinning with QUIC connections and GnuTLS, and with standard certificate verification explicitly disabled, curl could bypass the intended public key check. This oversight allows a malicious server to impersonate a legitimate one, potentially leading to unauthorized access or information disclosure due to a failure in verifying the server\u0027s identity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Public key pinning bypass via QUIC and GnuTLS allows server impersonation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. The flaw in curl occurs only when using `CURLOPT_PINNEDPUBLICKEY` with QUIC and ngtcp2 built with GnuTLS, and when standard certificate verification is explicitly disabled. This specific combination of features and configuration is uncommon in Red Hat deployments, limiting the overall impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13034"
},
{
"category": "external",
"summary": "RHBZ#2426406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13034"
}
],
"release_date": "2026-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "To mitigate this issue, ensure that standard certificate verification is not explicitly disabled when utilizing `CURLOPT_PINNEDPUBLICKEY` or `--pinnedpubkey` with curl. This practice prevents the bypass of the pinned public key check, particularly in configurations involving QUIC and `ngtcp2` built with GnuTLS. Always verify server certificates through standard means to maintain secure connections.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: Public key pinning bypass via QUIC and GnuTLS allows server impersonation"
},
{
"cve": "CVE-2025-14017",
"cwe": {
"id": "CWE-1058",
"name": "Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element"
},
"discovery_date": "2026-01-08T11:01:16.184214+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427870"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When performing multi-threaded LDAPS (Lightweight Directory Access Protocol Secure) transfers, changes to Transport Layer Security (TLS) options in one thread could inadvertently apply globally, affecting other concurrent transfers. This could lead to unintended security posture changes, such as disabling certificate verification for other threads. This vulnerability can result in a security bypass, where expected security checks are not performed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. The flaw in curl affects multi-threaded LDAPS transfers where changes to TLS options in one thread could inadvertently apply globally, impacting other concurrent transfers. This could lead to a security bypass if an application relies on specific TLS settings that are then overridden. Impact is limited to applications utilizing libcurl for multi-threaded LDAPS connections that dynamically modify TLS options.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14017"
},
{
"category": "external",
"summary": "RHBZ#2427870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427870"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14017",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14017"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-14017.html",
"url": "https://curl.se/docs/CVE-2025-14017.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-14017.json",
"url": "https://curl.se/docs/CVE-2025-14017.json"
}
],
"release_date": "2026-01-08T10:07:05.554000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers"
},
{
"cve": "CVE-2025-14524",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2025-12-31T03:46:56.325000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426407"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When an OAuth2 (Open Authorization) bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a different scheme like IMAP, LDAP, POP3, or SMTP, curl might incorrectly pass the bearer token to the new target host. This could lead to information disclosure, where sensitive authentication tokens are exposed to unintended recipients.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Information disclosure via cross-protocol redirect with OAuth2 bearer token",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat because `curl` might inadvertently pass an OAuth2 bearer token during a cross-protocol redirect from HTTP(S) to IMAP, LDAP, POP3, or SMTP schemes. This could lead to unintended information disclosure if applications using `curl` are configured to perform such redirects with bearer tokens.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "RHBZ#2426407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426407"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14524",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14524"
}
],
"release_date": "2026-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Information disclosure via cross-protocol redirect with OAuth2 bearer token"
},
{
"cve": "CVE-2025-14819",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2025-12-31T03:46:56.325000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426408"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libcurl. When handling secure connections (TLS) and reusing connection settings, libcurl could incorrectly apply a cached security setting related to certificate chain validation. This could allow libcurl to accept a server\u0027s security certificate that it should have otherwise rejected, potentially compromising the integrity of the secure connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libcurl: Improper certificate validation due to cached TLS settings reuse",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat because `libcurl` could incorrectly reuse a cached CA store when applications alter the `CURLSSLOPT_NO_PARTIALCHAIN` option with re-used easy or multi handles. This could lead to the acceptance of an otherwise untrusted TLS trust chain. Exploitation requires specific application logic that dynamically changes this option while reusing `libcurl` handles.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "RHBZ#2426408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426408"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14819"
}
],
"release_date": "2026-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: libcurl: Improper certificate validation due to cached TLS settings reuse"
},
{
"cve": "CVE-2025-15079",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"discovery_date": "2025-12-31T03:46:56.768000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426409"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When performing SSH-based transfers using SCP or SFTP, libcurl could mistakenly connect to hosts not listed in the user-specified knownhosts file. This occurs if the host is present in the libssh global knownhosts file, effectively bypassing the intended host verification. This could allow a remote attacker to connect to an untrusted host, potentially leading to information disclosure or man-in-the-middle attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Host verification bypass during SSH transfers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat because libcurl, when configured for SSH-based transfers (SCP/SFTP) with a user-specified knownhosts file, may bypass this configuration and accept connections to hosts present in the system-wide libssh global knownhosts file. This could lead to unintended host trust in specific deployment scenarios.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "RHBZ#2426409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15079",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15079"
}
],
"release_date": "2026-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "To mitigate this issue, ensure that the system-wide `libssh` global knownhosts file (`/etc/ssh/ssh_known_hosts`) does not contain entries for untrusted hosts. Alternatively, avoid using `libcurl` for SCP or SFTP transfers in environments where strict enforcement of a user-specified knownhosts file is critical and the system-wide knownhosts file cannot be fully controlled. Services relying on `libssh` for host key verification may need to be restarted to apply the changes.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: Host verification bypass during SSH transfers"
},
{
"cve": "CVE-2025-15224",
"cwe": {
"id": "CWE-305",
"name": "Authentication Bypass by Primary Weakness"
},
"discovery_date": "2025-12-31T03:58:07.013000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2426410"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libcurl. When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libssh key passphrase bypass without agent set",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. The flaw in libcurl, when built with the libssh backend, allows it to wrongly attempt authentication via a locally running SSH agent during public key authentication for SCP or SFTP transfers. However, successful authentication still requires the SSH agent to possess the correct passphrase.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "RHBZ#2426410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426410"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15224",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15224"
}
],
"release_date": "2026-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "curl: libssh key passphrase bypass without agent set"
},
{
"cve": "CVE-2026-1965",
"cwe": {
"id": "CWE-303",
"name": "Incorrect Implementation of Authentication Algorithm"
},
"discovery_date": "2026-03-11T11:00:54.752485+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2446448"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When an application uses libcurl to make multiple Negotiate-authenticated HTTP or HTTPS requests to the same server with different credentials, libcurl may incorrectly reuse an existing connection. This logical error can cause a subsequent request to be sent using the authentication of a previous user, leading to an authentication bypass.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1965"
},
{
"category": "external",
"summary": "RHBZ#2446448",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446448"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1965"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-1965.html",
"url": "https://curl.se/docs/CVE-2026-1965.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-1965.json",
"url": "https://curl.se/docs/CVE-2026-1965.json"
}
],
"release_date": "2026-03-11T10:08:52.431000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication"
},
{
"cve": "CVE-2026-3783",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2026-03-11T11:01:01.429907+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2446450"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When an OAuth2 bearer token is used for an HTTP(S) transfer that redirects to a second URL, curl could unintentionally leak the token. This occurs if the second hostname has entries in the `.netrc` file, allowing the bearer token intended for the first host to be sent to the redirected host. This information disclosure could allow an attacker to gain unauthorized access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-3783"
},
{
"category": "external",
"summary": "RHBZ#2446450",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446450"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-3783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3783"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/03/11/2",
"url": "http://www.openwall.com/lists/oss-security/2026/03/11/2"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3783.html",
"url": "https://curl.se/docs/CVE-2026-3783.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3783.json",
"url": "https://curl.se/docs/CVE-2026-3783.json"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3583983",
"url": "https://hackerone.com/reports/3583983"
}
],
"release_date": "2026-03-11T10:09:08.746000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "To prevent the leakage of OAuth2 bearer tokens, ensure that `.netrc` files are carefully managed. Avoid configuring `.netrc` entries for untrusted or unknown hostnames, particularly when `curl` is used with OAuth2 bearer tokens and is configured to follow redirects. Regularly review and restrict the scope of credentials stored in `.netrc` files to only explicitly trusted destinations.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect"
},
{
"cve": "CVE-2026-3784",
"cwe": {
"id": "CWE-305",
"name": "Authentication Bypass by Primary Weakness"
},
"discovery_date": "2026-03-11T11:00:57.752827+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2446449"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. This vulnerability allows curl to wrongly reuse an existing HTTP proxy connection when performing a CONNECT request to a server, even if the new request uses different authentication credentials for the HTTP proxy. This improper connection reuse could lead to an attacker gaining unauthorized access to resources or information intended for a different user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl: Unauthorized access due to improper HTTP proxy connection reuse",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-3784"
},
{
"category": "external",
"summary": "RHBZ#2446449",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446449"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-3784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3784"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/03/11/3",
"url": "http://www.openwall.com/lists/oss-security/2026/03/11/3"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3784.html",
"url": "https://curl.se/docs/CVE-2026-3784.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3784.json",
"url": "https://curl.se/docs/CVE-2026-3784.json"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3584903",
"url": "https://hackerone.com/reports/3584903"
}
],
"release_date": "2026-03-11T10:09:21.418000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: curl: Unauthorized access due to improper HTTP proxy connection reuse"
},
{
"cve": "CVE-2026-3805",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2026-03-11T11:01:04.465150+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2446451"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. When handling a second Server Message Block (SMB) request to the same host, curl incorrectly accesses memory that has already been freed. This memory corruption vulnerability, known as a use-after-free, could allow a remote attacker to potentially execute arbitrary code or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: curl: Arbitrary code execution or Denial of Service via use-after-free in SMB request handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-3805"
},
{
"category": "external",
"summary": "RHBZ#2446451",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446451"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-3805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3805"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/03/11/4",
"url": "http://www.openwall.com/lists/oss-security/2026/03/11/4"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3805.html",
"url": "https://curl.se/docs/CVE-2026-3805.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2026-3805.json",
"url": "https://curl.se/docs/CVE-2026-3805.json"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3591944",
"url": "https://hackerone.com/reports/3591944"
}
],
"release_date": "2026-03-11T10:09:37.729000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-07T15:43:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6893"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:curl-main@aarch64",
"Red Hat Hardened Images:curl-main@src",
"Red Hat Hardened Images:curl-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: curl: Arbitrary code execution or Denial of Service via use-after-free in SMB request handling"
}
]
}
CERTFR-2026-AVI-0218
Vulnerability from certfr_avis - Published: 2026-02-26 - Updated: 2026-02-26
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | Platform Services pour Tanzu Platform versions antérieures à 10.3.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.5 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.12.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions antérieures à 4.3.2 sur Kubernetes | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.238.x | ||
| VMware | Workstation | Workstation versions antérieures à 25H2u1 | ||
| VMware | Fusion | Fusion versions antérieures à 25H2u1 sur MacOS | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.1065.x | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.16.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Windows) versions antérieures à 2019.95.x | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.8.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions antérieures à 14.21.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Platform Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.12.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 4.3.2 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.2.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.238.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Workstation versions ant\u00e9rieures \u00e0 25H2u1",
"product": {
"name": "Workstation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Fusion versions ant\u00e9rieures \u00e0 25H2u1 sur MacOS",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.1065.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.16.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Windows) versions ant\u00e9rieures \u00e0 2019.95.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.8.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 14.21.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2026-22722",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22722"
},
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-62727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62727"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2024-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2025-58190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58190"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2022-2255",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2255"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-7545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7545"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-47008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47008"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-28164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28164"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-11840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11840"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-47629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38417"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-1181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1181"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2023-25586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25586"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2017-20052",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-20052"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-0840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0840"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2021-3998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
},
{
"name": "CVE-2025-1179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1179"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2026-22715",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22715"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-47007",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47007"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-25433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25433"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2022-4285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4285"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2026-22716",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22716"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"name": "CVE-2022-47695",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47695"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2022-50458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50458"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2026-0994",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0994"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2016-9840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9840"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2023-53107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53107"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2025-55198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55198"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1182"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2008-0888",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0888"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2023-25584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25584"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-11082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11082"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-1149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1149"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2022-50444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50444"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2021-46174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46174"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2023-53164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53164"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2023-26966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26966"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2022-48065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48065"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2022-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47696"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2022-35205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35205"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2025-1178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1178"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-1176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1176"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2025-12119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12119"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-34410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34410"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-47911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47911"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-28162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28162"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2022-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49920"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2022-50247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50247"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-12383",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12383"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2023-52355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52355"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2022-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3970"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-50249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50249"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2023-53182",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53182"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2025-11083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11083"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2022-3479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2026-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1002"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2023-25435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2022-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-33285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33285"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-11081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11081"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2026-22184",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22184"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2022-48063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48063"
},
{
"name": "CVE-2024-53589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53589"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2023-32181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32181"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-11495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11495"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2019-9076",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9076"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-55199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55199"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2021-20205",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20205"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-11414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2022-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50250"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2021-29390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29390"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2021-20284",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20284"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1972"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2023-32573",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32573"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2020-19726",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19726"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-47010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47010"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2022-33070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33070"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2024-57360",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57360"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2023-30775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2023-37369",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37369"
},
{
"name": "CVE-2024-48615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48615"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-25588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25588"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2025-8959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8959"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-0665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2012-0880",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2018-9996",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9996"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2025-8225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8225"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2025-8224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8224"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5245"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2025-11966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11966"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2022-47011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47011"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-12194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12194"
},
{
"name": "CVE-2021-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3549"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-5244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5244"
},
{
"name": "CVE-2021-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37972"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2023-4863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4863"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2025-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1153"
},
{
"name": "CVE-2025-62408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62408"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2025-11412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2023-25434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2022-35206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35206"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2022-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38533"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2023-36660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36660"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2023-25585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25585"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2020-12762",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12762"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-3198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3198"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2026-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2007"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-11839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11839"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2024-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8244"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2026-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0900"
},
{
"name": "CVE-2020-16599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16599"
},
{
"name": "CVE-2021-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46822"
},
{
"name": "CVE-2022-45703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45703"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2022-47673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47673"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2021-20197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20197"
},
{
"name": "CVE-2023-24056",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24056"
},
{
"name": "CVE-2026-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0902"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2026-22717",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22717"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-29480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29480"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2023-1999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1999"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-7546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7546"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2025-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1148"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2023-1579",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1579"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2021-43396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43396"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2023-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38197"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-64702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64702"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-11494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11494"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-26T00:00:00",
"last_revision_date": "2026-02-26T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0218",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37096"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37092"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37102"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37078"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37109"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37087",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37087"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37090",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37090"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37077",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37077"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37098"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37079",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37079"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37101"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37104",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37104"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37080",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37080"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37097"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37083",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37083"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37086",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37086"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37082",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37082"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37100"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37099"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37081",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37081"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37089",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37089"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37076",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37076"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37088",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37088"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36986",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36986"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37103"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37084",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37084"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37110"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37093"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37085",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37085"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37095"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37094"
}
]
}
CERTFR-2026-AVI-0093
Vulnerability from certfr_avis - Published: 2026-01-28 - Updated: 2026-01-28
De multiples vulnérabilités ont été découvertes dans Tenable Network Monitor. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Nessus Network Monitor | Network Monitor versions antérieures à 6.5.3 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Network Monitor versions ant\u00e9rieures \u00e0 6.5.3",
"product": {
"name": "Nessus Network Monitor",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2024-0232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0232"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-62408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62408"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
}
],
"initial_release_date": "2026-01-28T00:00:00",
"last_revision_date": "2026-01-28T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0093",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-28T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Network Monitor. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Network Monitor",
"vendor_advisories": [
{
"published_at": "2026-01-27",
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2026-02",
"url": "https://www.tenable.com/security/tns-2026-02"
}
]
}
CERTFR-2026-AVI-0093
Vulnerability from certfr_avis - Published: 2026-01-28 - Updated: 2026-01-28
De multiples vulnérabilités ont été découvertes dans Tenable Network Monitor. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Nessus Network Monitor | Network Monitor versions antérieures à 6.5.3 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Network Monitor versions ant\u00e9rieures \u00e0 6.5.3",
"product": {
"name": "Nessus Network Monitor",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2024-0232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0232"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-62408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62408"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
}
],
"initial_release_date": "2026-01-28T00:00:00",
"last_revision_date": "2026-01-28T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0093",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-28T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Network Monitor. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Network Monitor",
"vendor_advisories": [
{
"published_at": "2026-01-27",
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2026-02",
"url": "https://www.tenable.com/security/tns-2026-02"
}
]
}
CERTFR-2026-AVI-0315
Vulnerability from certfr_avis - Published: 2026-03-18 - Updated: 2026-03-18
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Elastic Application Runtime for VMware Tanzu Platform versions antérieures à 10.3.6 | ||
| VMware | N/A | .NET Core Buildpack versions antérieures à 2.4.86 | ||
| VMware | N/A | Go Buildpack versions antérieures à 1.10.75 | ||
| VMware | Tanzu Platform | Tanzu Data Flow on Tanzu Platform versions antérieures à 2.0.4 | ||
| VMware | Tanzu Platform | Elastic Application Runtime for VMware Tanzu Platform versions antérieures à 6.0.26+LTS-T | ||
| VMware | Tanzu Platform | Extended App Support for Tanzu Platform versions antérieures à 1.0.17 | ||
| VMware | Tanzu Platform | Elastic Application Runtime for VMware Tanzu Platform versions antérieures à 10.2.9+LTS-T | ||
| VMware | N/A | Binary Buildpack versions antérieures à 1.1.61 | ||
| VMware | N/A | VMware Harbor Registry versions antérieures à 2.14.3 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Elastic Application Runtime for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": ".NET Core Buildpack versions ant\u00e9rieures \u00e0 2.4.86",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Go Buildpack versions ant\u00e9rieures \u00e0 1.10.75",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Flow on Tanzu Platform versions ant\u00e9rieures \u00e0 2.0.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.26+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Extended App Support for Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.17",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.9+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Binary Buildpack versions ant\u00e9rieures \u00e0 1.1.61",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Harbor Registry versions ant\u00e9rieures \u00e0 2.14.3",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2026-23831",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23831"
},
{
"name": "CVE-2026-22701",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22701"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29923"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2026-1703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1703"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-12781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12781"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2026-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26958"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2026-25934",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25934"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2026-22702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22702"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2026-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3805"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2026-1229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1229"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2026-24117",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24117"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-24358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24358"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2025-47909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47909"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2026-24137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24137"
},
{
"name": "CVE-2017-8806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8806"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2026-22703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22703"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
}
],
"initial_release_date": "2026-03-18T00:00:00",
"last_revision_date": "2026-03-18T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0315",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37197",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37197"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37202",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37202"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37200",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37200"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37209",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37209"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37198",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37198"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37208",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37208"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37206",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37206"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37204",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37204"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37203",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37203"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37207",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37207"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37199",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37199"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37210",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37210"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37205",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37205"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37201",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37201"
}
]
}
CERTFR-2026-AVI-0178
Vulnerability from certfr_avis - Published: 2026-02-18 - Updated: 2026-02-18
De multiples vulnérabilités ont été découvertes dans Tenable Security Center. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Security Center | Security Center versions 6.5.x antérieures à 6.5.1 sans les correctifs de sécurité SC-202602.1 et SC-202602.2 | ||
| Tenable | Security Center | Security Center versions 6.6.x antérieures à 6.6.0 sans les correctifs de sécurité SC-202602.1 et SC-202602.2 | ||
| Tenable | Security Center | Security Center versions 6.7.x antérieures à 6.7.2 sans les correctifs de sécurité SC-202602.1 et SC-202602.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Security Center versions 6.5.x ant\u00e9rieures \u00e0 6.5.1 sans les correctifs de s\u00e9curit\u00e9 SC-202602.1 et SC-202602.2",
"product": {
"name": "Security Center",
"vendor": {
"name": "Tenable",
"scada": false
}
}
},
{
"description": "Security Center versions 6.6.x ant\u00e9rieures \u00e0 6.6.0 sans les correctifs de s\u00e9curit\u00e9 SC-202602.1 et SC-202602.2",
"product": {
"name": "Security Center",
"vendor": {
"name": "Tenable",
"scada": false
}
}
},
{
"description": "Security Center versions 6.7.x ant\u00e9rieures \u00e0 6.7.2 sans les correctifs de s\u00e9curit\u00e9 SC-202602.1 et SC-202602.2",
"product": {
"name": "Security Center",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-14177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14177"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2025-54090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54090"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2025-14180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14180"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2026-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2630"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-14178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14178"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
}
],
"initial_release_date": "2026-02-18T00:00:00",
"last_revision_date": "2026-02-18T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0178",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Security Center. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Security Center",
"vendor_advisories": [
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2026-06",
"url": "https://www.tenable.com/security/tns-2026-06"
}
]
}
CERTFR-2026-AVI-0470
Vulnerability from certfr_avis - Published: 2026-04-22 - Updated: 2026-04-22
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | PeopleSoft | PeopleSoft Enterprise FIN Contracts version 9.2 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise HCM Absence Management version 9.2 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise CC Common Application Objects version 9.2 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise HCM Human Resources version 9.2 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.61 à 8.62 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise FIN Project Costing version 9.2 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise SCM Purchasing version 9.2 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise HCM Shared Components version 9.2 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise FIN Maintenance Management version 9.2 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise CS Student Records version 9.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "PeopleSoft Enterprise FIN Contracts version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise HCM Absence Management version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise CC Common Application Objects version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise HCM Human Resources version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise PeopleTools version 8.61 \u00e0 8.62",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise FIN Project Costing version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise SCM Purchasing version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise HCM Shared Components version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise FIN Maintenance Management version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise CS Student Records version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-34300",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34300"
},
{
"name": "CVE-2026-34306",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34306"
},
{
"name": "CVE-2026-34309",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34309"
},
{
"name": "CVE-2026-34280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34280"
},
{
"name": "CVE-2026-34277",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34277"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2025-43966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43966"
},
{
"name": "CVE-2026-22006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22006"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-43967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43967"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2026-35241",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35241"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2026-34295",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34295"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2026-34299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34299"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2026-34301",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34301"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2026-34307",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34307"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-34269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34269"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-29482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29482"
},
{
"name": "CVE-2026-34266",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34266"
},
{
"name": "CVE-2026-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22019"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
}
],
"initial_release_date": "2026-04-22T00:00:00",
"last_revision_date": "2026-04-22T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0470",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft",
"vendor_advisories": [
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle PeopleSoft cpuapr2026",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html"
}
]
}
CERTFR-2026-AVI-0010
Vulnerability from certfr_avis - Published: 2026-01-07 - Updated: 2026-01-07
De multiples vulnérabilités ont été découvertes dans Curl. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Curl | cURL et libcurl | Curl versions 7.17.x à 8.x antérieures à 8.18.0 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Curl versions 7.17.x \u00e0 8.x ant\u00e9rieures \u00e0 8.18.0",
"product": {
"name": "cURL et libcurl",
"vendor": {
"name": "Curl",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
}
],
"initial_release_date": "2026-01-07T00:00:00",
"last_revision_date": "2026-01-07T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0010",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Curl. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Curl",
"vendor_advisories": [
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 Curl CVE-2025-15079",
"url": "https://curl.se/docs/CVE-2025-15079.html"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 Curl CVE-2025-14819",
"url": "https://curl.se/docs/CVE-2025-14819.html"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 Curl CVE-2025-15224",
"url": "https://curl.se/docs/CVE-2025-15224.html"
},
{
"published_at": "2026-01-06",
"title": "Bulletin de s\u00e9curit\u00e9 Curl CVE-2025-14524",
"url": "https://curl.se/docs/CVE-2025-14524.html"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 Curl CVE-2025-13034",
"url": "https://curl.se/docs/CVE-2025-13034.html"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 Curl CVE-2025-14017",
"url": "https://curl.se/docs/CVE-2025-14017.html"
}
]
}
CERTFR-2026-AVI-0010
Vulnerability from certfr_avis - Published: 2026-01-07 - Updated: 2026-01-07
De multiples vulnérabilités ont été découvertes dans Curl. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Curl | cURL et libcurl | Curl versions 7.17.x à 8.x antérieures à 8.18.0 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Curl versions 7.17.x \u00e0 8.x ant\u00e9rieures \u00e0 8.18.0",
"product": {
"name": "cURL et libcurl",
"vendor": {
"name": "Curl",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
}
],
"initial_release_date": "2026-01-07T00:00:00",
"last_revision_date": "2026-01-07T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0010",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Curl. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Curl",
"vendor_advisories": [
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 Curl CVE-2025-15079",
"url": "https://curl.se/docs/CVE-2025-15079.html"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 Curl CVE-2025-14819",
"url": "https://curl.se/docs/CVE-2025-14819.html"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 Curl CVE-2025-15224",
"url": "https://curl.se/docs/CVE-2025-15224.html"
},
{
"published_at": "2026-01-06",
"title": "Bulletin de s\u00e9curit\u00e9 Curl CVE-2025-14524",
"url": "https://curl.se/docs/CVE-2025-14524.html"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 Curl CVE-2025-13034",
"url": "https://curl.se/docs/CVE-2025-13034.html"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 Curl CVE-2025-14017",
"url": "https://curl.se/docs/CVE-2025-14017.html"
}
]
}
CERTFR-2026-AVI-0469
Vulnerability from certfr_avis - Published: 2026-04-22 - Updated: 2026-04-22
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Server (Server: JSON) version 8.0.0 à 8.0.45 | ||
| Oracle | MySQL | MySQL Workbench version 8.0.0 à 8.0.46 | ||
| Oracle | MySQL | MySQL Shell (Shell: Core Client) version 9.0.0 à 9.6.0 | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.0.0 à 8.0.45 | ||
| Oracle | MySQL | MySQL Server (Server: DML) version 9.0.0 à 9.6.0 | ||
| Oracle | MySQL | MySQL Enterprise Backup version 8.0.0 à 8.0.45 | ||
| Oracle | MySQL | MySQL Enterprise Backup version 9.0.0 à 9.6.0 | ||
| Oracle | MySQL | MySQL Enterprise Backup version 8.4.0 à 8.4.8 | ||
| Oracle | MySQL | MySQL Server (Server: DML) version 8.0.0 à 8.0.45 | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.4.0 à 8.4.8 | ||
| Oracle | MySQL | MySQL Server (Server: JSON) version 8.4.0 à 8.4.8 | ||
| Oracle | MySQL | MySQL Shell (Shell: Core Client) version 8.0.0 à 8.0.45 | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.0 à 8.0.45 | ||
| Oracle | MySQL | MySQL Server (Server: Group Replication Plugin) version 8.4.0 à 8.4.8 | ||
| Oracle | MySQL | MySQL Shell (Shell: Core Client) version 8.4.0 à 8.4.8 | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 9.0.0 à 9.6.0 | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 9.0.0 à 9.6.0 | ||
| Oracle | MySQL | MySQL Cluster version 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Server (Server: Partition) version 9.0.0 à 9.6.0 | ||
| Oracle | MySQL | MySQL Server (Server: Information Schema) version 8.0.0 à 8.0.45 | ||
| Oracle | MySQL | MySQL Server (Server: Group Replication Plugin) version 8.0.0 à 8.0.45 | ||
| Oracle | MySQL | MySQL Server (Server: GIS) version 9.0.0 à 9.6.0 | ||
| Oracle | MySQL | MySQL Cluster version 8.0.0 à 8.0.44 | ||
| Oracle | MySQL | MySQL Cluster version 8.4.0 à 8.4.7 | ||
| Oracle | MySQL | MySQL Server (Server: JSON) version 9.0.0 à 9.6.0 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.4.0 à 8.4.8 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.0.0 à 8.0.45 | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.0 à 8.4.8 | ||
| Oracle | MySQL | MySQL Server (Server: Group Replication Plugin) version 9.0.0 à 9.6.0 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 9.0.0 à 9.6.0 | ||
| Oracle | MySQL | MySQL Server (Server: Information Schema) version 8.4.0 à 8.4.8 | ||
| Oracle | MySQL | MySQL Server (Server: Information Schema) version 9.0.0 à 9.6.0 | ||
| Oracle | MySQL | MySQL Server (Server: DML) version 8.4.0 à 8.4.8 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Server (Server: JSON) version 8.0.0 \u00e0 8.0.45",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench version 8.0.0 \u00e0 8.0.46",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Shell (Shell: Core Client) version 9.0.0 \u00e0 9.6.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 8.0.0 \u00e0 8.0.45",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DML) version 9.0.0 \u00e0 9.6.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 8.0.0 \u00e0 8.0.45",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 9.0.0 \u00e0 9.6.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 8.4.0 \u00e0 8.4.8",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DML) version 8.0.0 \u00e0 8.0.45",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 8.4.0 \u00e0 8.4.8",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: JSON) version 8.4.0 \u00e0 8.4.8",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Shell (Shell: Core Client) version 8.0.0 \u00e0 8.0.45",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.0.0 \u00e0 8.0.45",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Group Replication Plugin) version 8.4.0 \u00e0 8.4.8",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Shell (Shell: Core Client) version 8.4.0 \u00e0 8.4.8",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 9.0.0 \u00e0 9.6.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 9.0.0 \u00e0 9.6.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Partition) version 9.0.0 \u00e0 9.6.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Information Schema) version 8.0.0 \u00e0 8.0.45",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Group Replication Plugin) version 8.0.0 \u00e0 8.0.45",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: GIS) version 9.0.0 \u00e0 9.6.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.0.0 \u00e0 8.0.44",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.4.0 \u00e0 8.4.7",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: JSON) version 9.0.0 \u00e0 9.6.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 8.4.0 \u00e0 8.4.8",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 8.0.0 \u00e0 8.0.45",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.4.0 \u00e0 8.4.8",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Group Replication Plugin) version 9.0.0 \u00e0 9.6.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 9.0.0 \u00e0 9.6.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Information Schema) version 8.4.0 \u00e0 8.4.8",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Information Schema) version 9.0.0 \u00e0 9.6.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DML) version 8.4.0 \u00e0 8.4.8",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2026-35238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35238"
},
{
"name": "CVE-2026-34267",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34267"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2026-35239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35239"
},
{
"name": "CVE-2026-34271",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34271"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2026-34270",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34270"
},
{
"name": "CVE-2025-5449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5449"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2026-34303",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34303"
},
{
"name": "CVE-2026-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22009"
},
{
"name": "CVE-2026-21998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21998"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2026-35236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35236"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2026-35237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35237"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2026-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22017"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2026-34304",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34304"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2026-22002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22002"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2026-34308",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34308"
},
{
"name": "CVE-2026-35234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35234"
},
{
"name": "CVE-2026-34272",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34272"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2026-35240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35240"
},
{
"name": "CVE-2026-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22004"
},
{
"name": "CVE-2026-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22001"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2026-34318",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34318"
},
{
"name": "CVE-2026-35235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35235"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2026-34317",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34317"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2026-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22015"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2026-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22005"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2026-34278",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34278"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2026-34319",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34319"
},
{
"name": "CVE-2026-34276",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34276"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2026-34293",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34293"
}
],
"initial_release_date": "2026-04-22T00:00:00",
"last_revision_date": "2026-04-22T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0469",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpuapr2026",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html"
}
]
}
OPENSUSE-SU-2026:20031-1
Vulnerability from csaf_opensuse - Published: 2026-01-14 11:01 - Updated: 2026-01-14 11:01| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\nThis update for curl fixes the following issues:\n\n- CVE-2025-14017: broken TLS options for threaded LDAPS (bsc#1256105).\n- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).\n- CVE-2025-14819: libssh global knownhost override (bsc#1255732).\n- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).\n- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-140",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20031-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE Bug 1255734",
"url": "https://bugzilla.suse.com/1255734"
},
{
"category": "self",
"summary": "SUSE Bug 1256105",
"url": "https://bugzilla.suse.com/1256105"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14017 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-01-14T11:01:44Z",
"generator": {
"date": "2026-01-14T11:01:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20031-1",
"initial_release_date": "2026-01-14T11:01:44Z",
"revision_history": [
{
"date": "2026-01-14T11:01:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.aarch64",
"product": {
"name": "curl-8.14.1-160000.4.1.aarch64",
"product_id": "curl-8.14.1-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-160000.4.1.aarch64",
"product": {
"name": "libcurl-devel-8.14.1-160000.4.1.aarch64",
"product_id": "libcurl-devel-8.14.1-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.aarch64",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.aarch64",
"product_id": "libcurl4-8.14.1-160000.4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-fish-completion-8.14.1-160000.4.1.noarch",
"product": {
"name": "curl-fish-completion-8.14.1-160000.4.1.noarch",
"product_id": "curl-fish-completion-8.14.1-160000.4.1.noarch"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.14.1-160000.4.1.noarch",
"product": {
"name": "curl-zsh-completion-8.14.1-160000.4.1.noarch",
"product_id": "curl-zsh-completion-8.14.1-160000.4.1.noarch"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"product": {
"name": "libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"product_id": "libcurl-devel-doc-8.14.1-160000.4.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.ppc64le",
"product": {
"name": "curl-8.14.1-160000.4.1.ppc64le",
"product_id": "curl-8.14.1-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-160000.4.1.ppc64le",
"product": {
"name": "libcurl-devel-8.14.1-160000.4.1.ppc64le",
"product_id": "libcurl-devel-8.14.1-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.ppc64le",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.ppc64le",
"product_id": "libcurl4-8.14.1-160000.4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.s390x",
"product": {
"name": "curl-8.14.1-160000.4.1.s390x",
"product_id": "curl-8.14.1-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-160000.4.1.s390x",
"product": {
"name": "libcurl-devel-8.14.1-160000.4.1.s390x",
"product_id": "libcurl-devel-8.14.1-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.s390x",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.s390x",
"product_id": "libcurl4-8.14.1-160000.4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.x86_64",
"product": {
"name": "curl-8.14.1-160000.4.1.x86_64",
"product_id": "curl-8.14.1-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-160000.4.1.x86_64",
"product": {
"name": "libcurl-devel-8.14.1-160000.4.1.x86_64",
"product_id": "libcurl-devel-8.14.1-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.x86_64",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.x86_64",
"product_id": "libcurl4-8.14.1-160000.4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64"
},
"product_reference": "curl-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "curl-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x"
},
"product_reference": "curl-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64"
},
"product_reference": "curl-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-fish-completion-8.14.1-160000.4.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch"
},
"product_reference": "curl-fish-completion-8.14.1-160000.4.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.14.1-160000.4.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch"
},
"product_reference": "curl-zsh-completion-8.14.1-160000.4.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.14.1-160000.4.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch"
},
"product_reference": "libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14017"
}
],
"notes": [
{
"category": "general",
"text": "When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl,\nchanging TLS options in one thread would inadvertently change them globally\nand therefore possibly also affect other concurrently setup transfers.\n\nDisabling certificate verification for a specific transfer could\nunintentionally disable the feature for other threads as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14017",
"url": "https://www.suse.com/security/cve/CVE-2025-14017"
},
{
"category": "external",
"summary": "SUSE Bug 1256105 for CVE-2025-14017",
"url": "https://bugzilla.suse.com/1256105"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T11:01:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-14017"
},
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T11:01:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T11:01:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T11:01:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:curl-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:curl-fish-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"openSUSE Leap 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"openSUSE Leap 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T11:01:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
OPENSUSE-SU-2026:10017-1
Vulnerability from csaf_opensuse - Published: 2026-01-08 00:00 - Updated: 2026-01-08 00:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "curl-8.18.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the curl-8.18.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10017",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10017-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14017 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "curl-8.18.0-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-08T00:00:00Z",
"generator": {
"date": "2026-01-08T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10017-1",
"initial_release_date": "2026-01-08T00:00:00Z",
"revision_history": [
{
"date": "2026-01-08T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.18.0-1.1.aarch64",
"product": {
"name": "curl-8.18.0-1.1.aarch64",
"product_id": "curl-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "curl-fish-completion-8.18.0-1.1.aarch64",
"product": {
"name": "curl-fish-completion-8.18.0-1.1.aarch64",
"product_id": "curl-fish-completion-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.18.0-1.1.aarch64",
"product": {
"name": "curl-zsh-completion-8.18.0-1.1.aarch64",
"product_id": "curl-zsh-completion-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.18.0-1.1.aarch64",
"product": {
"name": "libcurl-devel-8.18.0-1.1.aarch64",
"product_id": "libcurl-devel-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.18.0-1.1.aarch64",
"product": {
"name": "libcurl-devel-32bit-8.18.0-1.1.aarch64",
"product_id": "libcurl-devel-32bit-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.18.0-1.1.aarch64",
"product": {
"name": "libcurl-devel-doc-8.18.0-1.1.aarch64",
"product_id": "libcurl-devel-doc-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.18.0-1.1.aarch64",
"product": {
"name": "libcurl4-8.18.0-1.1.aarch64",
"product_id": "libcurl4-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.18.0-1.1.aarch64",
"product": {
"name": "libcurl4-32bit-8.18.0-1.1.aarch64",
"product_id": "libcurl4-32bit-8.18.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "wcurl-8.18.0-1.1.aarch64",
"product": {
"name": "wcurl-8.18.0-1.1.aarch64",
"product_id": "wcurl-8.18.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.18.0-1.1.ppc64le",
"product": {
"name": "curl-8.18.0-1.1.ppc64le",
"product_id": "curl-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "curl-fish-completion-8.18.0-1.1.ppc64le",
"product": {
"name": "curl-fish-completion-8.18.0-1.1.ppc64le",
"product_id": "curl-fish-completion-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.18.0-1.1.ppc64le",
"product": {
"name": "curl-zsh-completion-8.18.0-1.1.ppc64le",
"product_id": "curl-zsh-completion-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.18.0-1.1.ppc64le",
"product": {
"name": "libcurl-devel-8.18.0-1.1.ppc64le",
"product_id": "libcurl-devel-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"product": {
"name": "libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"product_id": "libcurl-devel-32bit-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.18.0-1.1.ppc64le",
"product": {
"name": "libcurl-devel-doc-8.18.0-1.1.ppc64le",
"product_id": "libcurl-devel-doc-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.18.0-1.1.ppc64le",
"product": {
"name": "libcurl4-8.18.0-1.1.ppc64le",
"product_id": "libcurl4-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.18.0-1.1.ppc64le",
"product": {
"name": "libcurl4-32bit-8.18.0-1.1.ppc64le",
"product_id": "libcurl4-32bit-8.18.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "wcurl-8.18.0-1.1.ppc64le",
"product": {
"name": "wcurl-8.18.0-1.1.ppc64le",
"product_id": "wcurl-8.18.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.18.0-1.1.s390x",
"product": {
"name": "curl-8.18.0-1.1.s390x",
"product_id": "curl-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "curl-fish-completion-8.18.0-1.1.s390x",
"product": {
"name": "curl-fish-completion-8.18.0-1.1.s390x",
"product_id": "curl-fish-completion-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.18.0-1.1.s390x",
"product": {
"name": "curl-zsh-completion-8.18.0-1.1.s390x",
"product_id": "curl-zsh-completion-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.18.0-1.1.s390x",
"product": {
"name": "libcurl-devel-8.18.0-1.1.s390x",
"product_id": "libcurl-devel-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.18.0-1.1.s390x",
"product": {
"name": "libcurl-devel-32bit-8.18.0-1.1.s390x",
"product_id": "libcurl-devel-32bit-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.18.0-1.1.s390x",
"product": {
"name": "libcurl-devel-doc-8.18.0-1.1.s390x",
"product_id": "libcurl-devel-doc-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.18.0-1.1.s390x",
"product": {
"name": "libcurl4-8.18.0-1.1.s390x",
"product_id": "libcurl4-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.18.0-1.1.s390x",
"product": {
"name": "libcurl4-32bit-8.18.0-1.1.s390x",
"product_id": "libcurl4-32bit-8.18.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "wcurl-8.18.0-1.1.s390x",
"product": {
"name": "wcurl-8.18.0-1.1.s390x",
"product_id": "wcurl-8.18.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.18.0-1.1.x86_64",
"product": {
"name": "curl-8.18.0-1.1.x86_64",
"product_id": "curl-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "curl-fish-completion-8.18.0-1.1.x86_64",
"product": {
"name": "curl-fish-completion-8.18.0-1.1.x86_64",
"product_id": "curl-fish-completion-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.18.0-1.1.x86_64",
"product": {
"name": "curl-zsh-completion-8.18.0-1.1.x86_64",
"product_id": "curl-zsh-completion-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.18.0-1.1.x86_64",
"product": {
"name": "libcurl-devel-8.18.0-1.1.x86_64",
"product_id": "libcurl-devel-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.18.0-1.1.x86_64",
"product": {
"name": "libcurl-devel-32bit-8.18.0-1.1.x86_64",
"product_id": "libcurl-devel-32bit-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.18.0-1.1.x86_64",
"product": {
"name": "libcurl-devel-doc-8.18.0-1.1.x86_64",
"product_id": "libcurl-devel-doc-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.18.0-1.1.x86_64",
"product": {
"name": "libcurl4-8.18.0-1.1.x86_64",
"product_id": "libcurl4-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.18.0-1.1.x86_64",
"product": {
"name": "libcurl4-32bit-8.18.0-1.1.x86_64",
"product_id": "libcurl4-32bit-8.18.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "wcurl-8.18.0-1.1.x86_64",
"product": {
"name": "wcurl-8.18.0-1.1.x86_64",
"product_id": "wcurl-8.18.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64"
},
"product_reference": "curl-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le"
},
"product_reference": "curl-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-8.18.0-1.1.s390x"
},
"product_reference": "curl-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64"
},
"product_reference": "curl-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-fish-completion-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64"
},
"product_reference": "curl-fish-completion-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-fish-completion-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le"
},
"product_reference": "curl-fish-completion-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-fish-completion-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x"
},
"product_reference": "curl-fish-completion-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-fish-completion-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64"
},
"product_reference": "curl-fish-completion-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64"
},
"product_reference": "curl-zsh-completion-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le"
},
"product_reference": "curl-zsh-completion-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x"
},
"product_reference": "curl-zsh-completion-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64"
},
"product_reference": "curl-zsh-completion-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64"
},
"product_reference": "libcurl-devel-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le"
},
"product_reference": "libcurl-devel-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x"
},
"product_reference": "libcurl-devel-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64"
},
"product_reference": "libcurl-devel-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-32bit-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64"
},
"product_reference": "libcurl-devel-32bit-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-32bit-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le"
},
"product_reference": "libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-32bit-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x"
},
"product_reference": "libcurl-devel-32bit-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-32bit-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64"
},
"product_reference": "libcurl-devel-32bit-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64"
},
"product_reference": "libcurl-devel-doc-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le"
},
"product_reference": "libcurl-devel-doc-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x"
},
"product_reference": "libcurl-devel-doc-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64"
},
"product_reference": "libcurl-devel-doc-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64"
},
"product_reference": "libcurl4-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le"
},
"product_reference": "libcurl4-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x"
},
"product_reference": "libcurl4-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64"
},
"product_reference": "libcurl4-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64"
},
"product_reference": "libcurl4-32bit-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le"
},
"product_reference": "libcurl4-32bit-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x"
},
"product_reference": "libcurl4-32bit-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64"
},
"product_reference": "libcurl4-32bit-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wcurl-8.18.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64"
},
"product_reference": "wcurl-8.18.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wcurl-8.18.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le"
},
"product_reference": "wcurl-8.18.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wcurl-8.18.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x"
},
"product_reference": "wcurl-8.18.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wcurl-8.18.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
},
"product_reference": "wcurl-8.18.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14017"
}
],
"notes": [
{
"category": "general",
"text": "When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl,\nchanging TLS options in one thread would inadvertently change them globally\nand therefore possibly also affect other concurrently setup transfers.\n\nDisabling certificate verification for a specific transfer could\nunintentionally disable the feature for other threads as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14017",
"url": "https://www.suse.com/security/cve/CVE-2025-14017"
},
{
"category": "external",
"summary": "SUSE Bug 1256105 for CVE-2025-14017",
"url": "https://bugzilla.suse.com/1256105"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-14017"
},
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:curl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-fish-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:curl-zsh-completion-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl-devel-doc-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-32bit-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:libcurl4-8.18.0-1.1.x86_64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.aarch64",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.ppc64le",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.s390x",
"openSUSE Tumbleweed:wcurl-8.18.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
SUSE-SU-2026:0052-1
Vulnerability from csaf_suse - Published: 2026-01-07 09:28 - Updated: 2026-01-07 09:28| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\n- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).\n- CVE-2025-14819: libssh global knownhost override (bsc#1255732).\n- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).\n- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-52,SUSE-SLE-Module-Basesystem-15-SP7-2026-52",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0052-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0052-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260052-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0052-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023696.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE Bug 1255734",
"url": "https://bugzilla.suse.com/1255734"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-01-07T09:28:37Z",
"generator": {
"date": "2026-01-07T09:28:37Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0052-1",
"initial_release_date": "2026-01-07T09:28:37Z",
"revision_history": [
{
"date": "2026-01-07T09:28:37Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150700.7.8.1.aarch64",
"product": {
"name": "curl-8.14.1-150700.7.8.1.aarch64",
"product_id": "curl-8.14.1-150700.7.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"product": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"product_id": "libcurl-devel-8.14.1-150700.7.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150700.7.8.1.aarch64",
"product": {
"name": "libcurl-mini4-8.14.1-150700.7.8.1.aarch64",
"product_id": "libcurl-mini4-8.14.1-150700.7.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150700.7.8.1.aarch64",
"product": {
"name": "libcurl4-8.14.1-150700.7.8.1.aarch64",
"product_id": "libcurl4-8.14.1-150700.7.8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libcurl-devel-64bit-8.14.1-150700.7.8.1.aarch64_ilp32",
"product": {
"name": "libcurl-devel-64bit-8.14.1-150700.7.8.1.aarch64_ilp32",
"product_id": "libcurl-devel-64bit-8.14.1-150700.7.8.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libcurl4-64bit-8.14.1-150700.7.8.1.aarch64_ilp32",
"product": {
"name": "libcurl4-64bit-8.14.1-150700.7.8.1.aarch64_ilp32",
"product_id": "libcurl4-64bit-8.14.1-150700.7.8.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150700.7.8.1.i586",
"product": {
"name": "curl-8.14.1-150700.7.8.1.i586",
"product_id": "curl-8.14.1-150700.7.8.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150700.7.8.1.i586",
"product": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.i586",
"product_id": "libcurl-devel-8.14.1-150700.7.8.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150700.7.8.1.i586",
"product": {
"name": "libcurl-mini4-8.14.1-150700.7.8.1.i586",
"product_id": "libcurl-mini4-8.14.1-150700.7.8.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150700.7.8.1.i586",
"product": {
"name": "libcurl4-8.14.1-150700.7.8.1.i586",
"product_id": "libcurl4-8.14.1-150700.7.8.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-fish-completion-8.14.1-150700.7.8.1.noarch",
"product": {
"name": "curl-fish-completion-8.14.1-150700.7.8.1.noarch",
"product_id": "curl-fish-completion-8.14.1-150700.7.8.1.noarch"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.14.1-150700.7.8.1.noarch",
"product": {
"name": "curl-zsh-completion-8.14.1-150700.7.8.1.noarch",
"product_id": "curl-zsh-completion-8.14.1-150700.7.8.1.noarch"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.14.1-150700.7.8.1.noarch",
"product": {
"name": "libcurl-devel-doc-8.14.1-150700.7.8.1.noarch",
"product_id": "libcurl-devel-doc-8.14.1-150700.7.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150700.7.8.1.ppc64le",
"product": {
"name": "curl-8.14.1-150700.7.8.1.ppc64le",
"product_id": "curl-8.14.1-150700.7.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"product": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"product_id": "libcurl-devel-8.14.1-150700.7.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150700.7.8.1.ppc64le",
"product": {
"name": "libcurl-mini4-8.14.1-150700.7.8.1.ppc64le",
"product_id": "libcurl-mini4-8.14.1-150700.7.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150700.7.8.1.ppc64le",
"product": {
"name": "libcurl4-8.14.1-150700.7.8.1.ppc64le",
"product_id": "libcurl4-8.14.1-150700.7.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150700.7.8.1.s390x",
"product": {
"name": "curl-8.14.1-150700.7.8.1.s390x",
"product_id": "curl-8.14.1-150700.7.8.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150700.7.8.1.s390x",
"product": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.s390x",
"product_id": "libcurl-devel-8.14.1-150700.7.8.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150700.7.8.1.s390x",
"product": {
"name": "libcurl-mini4-8.14.1-150700.7.8.1.s390x",
"product_id": "libcurl-mini4-8.14.1-150700.7.8.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150700.7.8.1.s390x",
"product": {
"name": "libcurl4-8.14.1-150700.7.8.1.s390x",
"product_id": "libcurl4-8.14.1-150700.7.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150700.7.8.1.x86_64",
"product": {
"name": "curl-8.14.1-150700.7.8.1.x86_64",
"product_id": "curl-8.14.1-150700.7.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"product": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"product_id": "libcurl-devel-8.14.1-150700.7.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.14.1-150700.7.8.1.x86_64",
"product": {
"name": "libcurl-devel-32bit-8.14.1-150700.7.8.1.x86_64",
"product_id": "libcurl-devel-32bit-8.14.1-150700.7.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150700.7.8.1.x86_64",
"product": {
"name": "libcurl-mini4-8.14.1-150700.7.8.1.x86_64",
"product_id": "libcurl-mini4-8.14.1-150700.7.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150700.7.8.1.x86_64",
"product": {
"name": "libcurl4-8.14.1-150700.7.8.1.x86_64",
"product_id": "libcurl4-8.14.1-150700.7.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"product": {
"name": "libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"product_id": "libcurl4-32bit-8.14.1-150700.7.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150700.7.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64"
},
"product_reference": "curl-8.14.1-150700.7.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150700.7.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le"
},
"product_reference": "curl-8.14.1-150700.7.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150700.7.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x"
},
"product_reference": "curl-8.14.1-150700.7.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150700.7.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64"
},
"product_reference": "curl-8.14.1-150700.7.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64"
},
"product_reference": "libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le"
},
"product_reference": "libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x"
},
"product_reference": "libcurl-devel-8.14.1-150700.7.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150700.7.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64"
},
"product_reference": "libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150700.7.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-150700.7.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150700.7.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le"
},
"product_reference": "libcurl4-8.14.1-150700.7.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150700.7.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x"
},
"product_reference": "libcurl4-8.14.1-150700.7.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150700.7.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-150700.7.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.14.1-150700.7.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64"
},
"product_reference": "libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:37Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:37Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:37Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.8.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:37Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
SUSE-SU-2026:20110-1
Vulnerability from csaf_suse - Published: 2026-01-14 10:58 - Updated: 2026-01-14 10:58| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\nThis update for curl fixes the following issues:\n\n- CVE-2025-14017: broken TLS options for threaded LDAPS (bsc#1256105).\n- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).\n- CVE-2025-14819: libssh global knownhost override (bsc#1255732).\n- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).\n- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SL-Micro-6.2-140",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20110-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20110-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620110-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20110-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023878.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE Bug 1255734",
"url": "https://bugzilla.suse.com/1255734"
},
{
"category": "self",
"summary": "SUSE Bug 1256105",
"url": "https://bugzilla.suse.com/1256105"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14017 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-01-14T10:58:55Z",
"generator": {
"date": "2026-01-14T10:58:55Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20110-1",
"initial_release_date": "2026-01-14T10:58:55Z",
"revision_history": [
{
"date": "2026-01-14T10:58:55Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.aarch64",
"product": {
"name": "curl-8.14.1-160000.4.1.aarch64",
"product_id": "curl-8.14.1-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.aarch64",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.aarch64",
"product_id": "libcurl4-8.14.1-160000.4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.ppc64le",
"product": {
"name": "curl-8.14.1-160000.4.1.ppc64le",
"product_id": "curl-8.14.1-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.ppc64le",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.ppc64le",
"product_id": "libcurl4-8.14.1-160000.4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.s390x",
"product": {
"name": "curl-8.14.1-160000.4.1.s390x",
"product_id": "curl-8.14.1-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.s390x",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.s390x",
"product_id": "libcurl4-8.14.1-160000.4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.x86_64",
"product": {
"name": "curl-8.14.1-160000.4.1.x86_64",
"product_id": "curl-8.14.1-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.x86_64",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.x86_64",
"product_id": "libcurl4-8.14.1-160000.4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.2",
"product": {
"name": "SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:transactional"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.aarch64"
},
"product_reference": "curl-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "curl-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.s390x"
},
"product_reference": "curl-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.x86_64"
},
"product_reference": "curl-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.s390x"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14017"
}
],
"notes": [
{
"category": "general",
"text": "When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl,\nchanging TLS options in one thread would inadvertently change them globally\nand therefore possibly also affect other concurrently setup transfers.\n\nDisabling certificate verification for a specific transfer could\nunintentionally disable the feature for other threads as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14017",
"url": "https://www.suse.com/security/cve/CVE-2025-14017"
},
{
"category": "external",
"summary": "SUSE Bug 1256105 for CVE-2025-14017",
"url": "https://bugzilla.suse.com/1256105"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T10:58:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-14017"
},
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T10:58:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T10:58:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T10:58:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Micro 6.2:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T10:58:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
SUSE-SU-2026:0066-1
Vulnerability from csaf_suse - Published: 2026-01-08 12:21 - Updated: 2026-01-08 12:21| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\n - CVE-2025-14524: Fixed bearer token leak on cross-protocol redirect (bsc#1255731)\n - CVE-2025-15079: Fixed unknown host connection acceptance when set in the global knownhostsfile (bsc#1255733)\n - CVE-2025-14819: Fixed issue where alteration of CURLSSLOPT_NO_PARTIALCHAIN could\n accidentally lead to CA cache reuse for which partial chain was reversed (bsc#1255732)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-66,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-66",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0066-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0066-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260066-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0066-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023711.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-01-08T12:21:35Z",
"generator": {
"date": "2026-01-08T12:21:35Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0066-1",
"initial_release_date": "2026-01-08T12:21:35Z",
"revision_history": [
{
"date": "2026-01-08T12:21:35Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.0.1-11.111.1.aarch64",
"product": {
"name": "curl-8.0.1-11.111.1.aarch64",
"product_id": "curl-8.0.1-11.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.0.1-11.111.1.aarch64",
"product": {
"name": "libcurl-devel-8.0.1-11.111.1.aarch64",
"product_id": "libcurl-devel-8.0.1-11.111.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.0.1-11.111.1.aarch64",
"product": {
"name": "libcurl4-8.0.1-11.111.1.aarch64",
"product_id": "libcurl4-8.0.1-11.111.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libcurl-devel-64bit-8.0.1-11.111.1.aarch64_ilp32",
"product": {
"name": "libcurl-devel-64bit-8.0.1-11.111.1.aarch64_ilp32",
"product_id": "libcurl-devel-64bit-8.0.1-11.111.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libcurl4-64bit-8.0.1-11.111.1.aarch64_ilp32",
"product": {
"name": "libcurl4-64bit-8.0.1-11.111.1.aarch64_ilp32",
"product_id": "libcurl4-64bit-8.0.1-11.111.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.0.1-11.111.1.i586",
"product": {
"name": "curl-8.0.1-11.111.1.i586",
"product_id": "curl-8.0.1-11.111.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.0.1-11.111.1.i586",
"product": {
"name": "libcurl-devel-8.0.1-11.111.1.i586",
"product_id": "libcurl-devel-8.0.1-11.111.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl4-8.0.1-11.111.1.i586",
"product": {
"name": "libcurl4-8.0.1-11.111.1.i586",
"product_id": "libcurl4-8.0.1-11.111.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.0.1-11.111.1.ppc64le",
"product": {
"name": "curl-8.0.1-11.111.1.ppc64le",
"product_id": "curl-8.0.1-11.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.0.1-11.111.1.ppc64le",
"product": {
"name": "libcurl-devel-8.0.1-11.111.1.ppc64le",
"product_id": "libcurl-devel-8.0.1-11.111.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.0.1-11.111.1.ppc64le",
"product": {
"name": "libcurl4-8.0.1-11.111.1.ppc64le",
"product_id": "libcurl4-8.0.1-11.111.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.0.1-11.111.1.s390",
"product": {
"name": "curl-8.0.1-11.111.1.s390",
"product_id": "curl-8.0.1-11.111.1.s390"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.0.1-11.111.1.s390",
"product": {
"name": "libcurl-devel-8.0.1-11.111.1.s390",
"product_id": "libcurl-devel-8.0.1-11.111.1.s390"
}
},
{
"category": "product_version",
"name": "libcurl4-8.0.1-11.111.1.s390",
"product": {
"name": "libcurl4-8.0.1-11.111.1.s390",
"product_id": "libcurl4-8.0.1-11.111.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.0.1-11.111.1.s390x",
"product": {
"name": "curl-8.0.1-11.111.1.s390x",
"product_id": "curl-8.0.1-11.111.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.0.1-11.111.1.s390x",
"product": {
"name": "libcurl-devel-8.0.1-11.111.1.s390x",
"product_id": "libcurl-devel-8.0.1-11.111.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.0.1-11.111.1.s390x",
"product": {
"name": "libcurl-devel-32bit-8.0.1-11.111.1.s390x",
"product_id": "libcurl-devel-32bit-8.0.1-11.111.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.0.1-11.111.1.s390x",
"product": {
"name": "libcurl4-8.0.1-11.111.1.s390x",
"product_id": "libcurl4-8.0.1-11.111.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.0.1-11.111.1.s390x",
"product": {
"name": "libcurl4-32bit-8.0.1-11.111.1.s390x",
"product_id": "libcurl4-32bit-8.0.1-11.111.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.0.1-11.111.1.x86_64",
"product": {
"name": "curl-8.0.1-11.111.1.x86_64",
"product_id": "curl-8.0.1-11.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.0.1-11.111.1.x86_64",
"product": {
"name": "libcurl-devel-8.0.1-11.111.1.x86_64",
"product_id": "libcurl-devel-8.0.1-11.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.0.1-11.111.1.x86_64",
"product": {
"name": "libcurl-devel-32bit-8.0.1-11.111.1.x86_64",
"product_id": "libcurl-devel-32bit-8.0.1-11.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.0.1-11.111.1.x86_64",
"product": {
"name": "libcurl4-8.0.1-11.111.1.x86_64",
"product_id": "libcurl4-8.0.1-11.111.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.0.1-11.111.1.x86_64",
"product": {
"name": "libcurl4-32bit-8.0.1-11.111.1.x86_64",
"product_id": "libcurl4-32bit-8.0.1-11.111.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.0.1-11.111.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64"
},
"product_reference": "curl-8.0.1-11.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.0.1-11.111.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64"
},
"product_reference": "libcurl-devel-8.0.1-11.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.0.1-11.111.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
},
"product_reference": "libcurl4-8.0.1-11.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.0.1-11.111.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64"
},
"product_reference": "libcurl4-32bit-8.0.1-11.111.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T12:21:35Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T12:21:35Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.111.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.111.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T12:21:35Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
}
]
}
SUSE-SU-2026:20062-1
Vulnerability from csaf_suse - Published: 2026-01-08 14:51 - Updated: 2026-01-08 14:51| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\n- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).\n- CVE-2025-14819: libssh global knownhost override (bsc#1255732).\n- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).\n- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-368",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20062-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20062-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620062-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20062-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023749.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE Bug 1255734",
"url": "https://bugzilla.suse.com/1255734"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-01-08T14:51:21Z",
"generator": {
"date": "2026-01-08T14:51:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20062-1",
"initial_release_date": "2026-01-08T14:51:21Z",
"revision_history": [
{
"date": "2026-01-08T14:51:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-slfo.1.1_4.1.aarch64",
"product": {
"name": "curl-8.14.1-slfo.1.1_4.1.aarch64",
"product_id": "curl-8.14.1-slfo.1.1_4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-slfo.1.1_4.1.aarch64",
"product": {
"name": "libcurl4-8.14.1-slfo.1.1_4.1.aarch64",
"product_id": "libcurl4-8.14.1-slfo.1.1_4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-slfo.1.1_4.1.ppc64le",
"product": {
"name": "curl-8.14.1-slfo.1.1_4.1.ppc64le",
"product_id": "curl-8.14.1-slfo.1.1_4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-slfo.1.1_4.1.ppc64le",
"product": {
"name": "libcurl4-8.14.1-slfo.1.1_4.1.ppc64le",
"product_id": "libcurl4-8.14.1-slfo.1.1_4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-slfo.1.1_4.1.s390x",
"product": {
"name": "curl-8.14.1-slfo.1.1_4.1.s390x",
"product_id": "curl-8.14.1-slfo.1.1_4.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-slfo.1.1_4.1.s390x",
"product": {
"name": "libcurl4-8.14.1-slfo.1.1_4.1.s390x",
"product_id": "libcurl4-8.14.1-slfo.1.1_4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-slfo.1.1_4.1.x86_64",
"product": {
"name": "curl-8.14.1-slfo.1.1_4.1.x86_64",
"product_id": "curl-8.14.1-slfo.1.1_4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-slfo.1.1_4.1.x86_64",
"product": {
"name": "libcurl4-8.14.1-slfo.1.1_4.1.x86_64",
"product_id": "libcurl4-8.14.1-slfo.1.1_4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-slfo.1.1_4.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.aarch64"
},
"product_reference": "curl-8.14.1-slfo.1.1_4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.ppc64le"
},
"product_reference": "curl-8.14.1-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-slfo.1.1_4.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.s390x"
},
"product_reference": "curl-8.14.1-slfo.1.1_4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-slfo.1.1_4.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.x86_64"
},
"product_reference": "curl-8.14.1-slfo.1.1_4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-slfo.1.1_4.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-slfo.1.1_4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.ppc64le"
},
"product_reference": "libcurl4-8.14.1-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-slfo.1.1_4.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.s390x"
},
"product_reference": "libcurl4-8.14.1-slfo.1.1_4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-slfo.1.1_4.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-slfo.1.1_4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T14:51:21Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T14:51:21Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T14:51:21Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:curl-8.14.1-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libcurl4-8.14.1-slfo.1.1_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T14:51:21Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
SUSE-SU-2026:0050-1
Vulnerability from csaf_suse - Published: 2026-01-07 09:28 - Updated: 2026-01-07 09:28| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\n- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).\n- CVE-2025-14819: libssh global knownhost override (bsc#1255732).\n- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).\n- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-50,openSUSE-SLE-15.6-2026-50",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0050-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0050-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260050-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0050-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023698.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE Bug 1255734",
"url": "https://bugzilla.suse.com/1255734"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-01-07T09:28:15Z",
"generator": {
"date": "2026-01-07T09:28:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0050-1",
"initial_release_date": "2026-01-07T09:28:15Z",
"revision_history": [
{
"date": "2026-01-07T09:28:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150600.4.34.1.aarch64",
"product": {
"name": "curl-8.14.1-150600.4.34.1.aarch64",
"product_id": "curl-8.14.1-150600.4.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"product": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"product_id": "libcurl-devel-8.14.1-150600.4.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150600.4.34.1.aarch64",
"product": {
"name": "libcurl-mini4-8.14.1-150600.4.34.1.aarch64",
"product_id": "libcurl-mini4-8.14.1-150600.4.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150600.4.34.1.aarch64",
"product": {
"name": "libcurl4-8.14.1-150600.4.34.1.aarch64",
"product_id": "libcurl4-8.14.1-150600.4.34.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libcurl-devel-64bit-8.14.1-150600.4.34.1.aarch64_ilp32",
"product": {
"name": "libcurl-devel-64bit-8.14.1-150600.4.34.1.aarch64_ilp32",
"product_id": "libcurl-devel-64bit-8.14.1-150600.4.34.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libcurl4-64bit-8.14.1-150600.4.34.1.aarch64_ilp32",
"product": {
"name": "libcurl4-64bit-8.14.1-150600.4.34.1.aarch64_ilp32",
"product_id": "libcurl4-64bit-8.14.1-150600.4.34.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150600.4.34.1.i586",
"product": {
"name": "curl-8.14.1-150600.4.34.1.i586",
"product_id": "curl-8.14.1-150600.4.34.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150600.4.34.1.i586",
"product": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.i586",
"product_id": "libcurl-devel-8.14.1-150600.4.34.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150600.4.34.1.i586",
"product": {
"name": "libcurl-mini4-8.14.1-150600.4.34.1.i586",
"product_id": "libcurl-mini4-8.14.1-150600.4.34.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150600.4.34.1.i586",
"product": {
"name": "libcurl4-8.14.1-150600.4.34.1.i586",
"product_id": "libcurl4-8.14.1-150600.4.34.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-fish-completion-8.14.1-150600.4.34.1.noarch",
"product": {
"name": "curl-fish-completion-8.14.1-150600.4.34.1.noarch",
"product_id": "curl-fish-completion-8.14.1-150600.4.34.1.noarch"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.14.1-150600.4.34.1.noarch",
"product": {
"name": "curl-zsh-completion-8.14.1-150600.4.34.1.noarch",
"product_id": "curl-zsh-completion-8.14.1-150600.4.34.1.noarch"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.14.1-150600.4.34.1.noarch",
"product": {
"name": "libcurl-devel-doc-8.14.1-150600.4.34.1.noarch",
"product_id": "libcurl-devel-doc-8.14.1-150600.4.34.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150600.4.34.1.ppc64le",
"product": {
"name": "curl-8.14.1-150600.4.34.1.ppc64le",
"product_id": "curl-8.14.1-150600.4.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"product": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"product_id": "libcurl-devel-8.14.1-150600.4.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150600.4.34.1.ppc64le",
"product": {
"name": "libcurl-mini4-8.14.1-150600.4.34.1.ppc64le",
"product_id": "libcurl-mini4-8.14.1-150600.4.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150600.4.34.1.ppc64le",
"product": {
"name": "libcurl4-8.14.1-150600.4.34.1.ppc64le",
"product_id": "libcurl4-8.14.1-150600.4.34.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150600.4.34.1.s390x",
"product": {
"name": "curl-8.14.1-150600.4.34.1.s390x",
"product_id": "curl-8.14.1-150600.4.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150600.4.34.1.s390x",
"product": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.s390x",
"product_id": "libcurl-devel-8.14.1-150600.4.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150600.4.34.1.s390x",
"product": {
"name": "libcurl-mini4-8.14.1-150600.4.34.1.s390x",
"product_id": "libcurl-mini4-8.14.1-150600.4.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150600.4.34.1.s390x",
"product": {
"name": "libcurl4-8.14.1-150600.4.34.1.s390x",
"product_id": "libcurl4-8.14.1-150600.4.34.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "curl-8.14.1-150600.4.34.1.x86_64",
"product_id": "curl-8.14.1-150600.4.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"product_id": "libcurl-devel-8.14.1-150600.4.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"product_id": "libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "libcurl-mini4-8.14.1-150600.4.34.1.x86_64",
"product_id": "libcurl-mini4-8.14.1-150600.4.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "libcurl4-8.14.1-150600.4.34.1.x86_64",
"product_id": "libcurl4-8.14.1-150600.4.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"product": {
"name": "libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"product_id": "libcurl4-32bit-8.14.1-150600.4.34.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150600.4.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64"
},
"product_reference": "curl-8.14.1-150600.4.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150600.4.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le"
},
"product_reference": "curl-8.14.1-150600.4.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150600.4.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x"
},
"product_reference": "curl-8.14.1-150600.4.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150600.4.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64"
},
"product_reference": "curl-8.14.1-150600.4.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64"
},
"product_reference": "libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le"
},
"product_reference": "libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x"
},
"product_reference": "libcurl-devel-8.14.1-150600.4.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-150600.4.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64"
},
"product_reference": "libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64"
},
"product_reference": "libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150600.4.34.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-150600.4.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150600.4.34.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le"
},
"product_reference": "libcurl4-8.14.1-150600.4.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150600.4.34.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x"
},
"product_reference": "libcurl4-8.14.1-150600.4.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150600.4.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-150600.4.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-32bit-8.14.1-150600.4.34.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64"
},
"product_reference": "libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:15Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:15Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:15Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:curl-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.34.1.x86_64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.aarch64",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.ppc64le",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.s390x",
"openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:15Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
SUSE-SU-2026:20082-1
Vulnerability from csaf_suse - Published: 2026-01-14 10:58 - Updated: 2026-01-14 10:58| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\nThis update for curl fixes the following issues:\n\n- CVE-2025-14017: broken TLS options for threaded LDAPS (bsc#1256105).\n- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).\n- CVE-2025-14819: libssh global knownhost override (bsc#1255732).\n- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).\n- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-140",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20082-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20082-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620082-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20082-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023816.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE Bug 1255734",
"url": "https://bugzilla.suse.com/1255734"
},
{
"category": "self",
"summary": "SUSE Bug 1256105",
"url": "https://bugzilla.suse.com/1256105"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14017 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-01-14T10:58:55Z",
"generator": {
"date": "2026-01-14T10:58:55Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20082-1",
"initial_release_date": "2026-01-14T10:58:55Z",
"revision_history": [
{
"date": "2026-01-14T10:58:55Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.aarch64",
"product": {
"name": "curl-8.14.1-160000.4.1.aarch64",
"product_id": "curl-8.14.1-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-160000.4.1.aarch64",
"product": {
"name": "libcurl-devel-8.14.1-160000.4.1.aarch64",
"product_id": "libcurl-devel-8.14.1-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-160000.4.1.aarch64",
"product": {
"name": "libcurl-mini4-8.14.1-160000.4.1.aarch64",
"product_id": "libcurl-mini4-8.14.1-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.aarch64",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.aarch64",
"product_id": "libcurl4-8.14.1-160000.4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-zsh-completion-8.14.1-160000.4.1.noarch",
"product": {
"name": "curl-zsh-completion-8.14.1-160000.4.1.noarch",
"product_id": "curl-zsh-completion-8.14.1-160000.4.1.noarch"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"product": {
"name": "libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"product_id": "libcurl-devel-doc-8.14.1-160000.4.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.ppc64le",
"product": {
"name": "curl-8.14.1-160000.4.1.ppc64le",
"product_id": "curl-8.14.1-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-160000.4.1.ppc64le",
"product": {
"name": "libcurl-devel-8.14.1-160000.4.1.ppc64le",
"product_id": "libcurl-devel-8.14.1-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"product": {
"name": "libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"product_id": "libcurl-mini4-8.14.1-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.ppc64le",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.ppc64le",
"product_id": "libcurl4-8.14.1-160000.4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.s390x",
"product": {
"name": "curl-8.14.1-160000.4.1.s390x",
"product_id": "curl-8.14.1-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-160000.4.1.s390x",
"product": {
"name": "libcurl-devel-8.14.1-160000.4.1.s390x",
"product_id": "libcurl-devel-8.14.1-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-160000.4.1.s390x",
"product": {
"name": "libcurl-mini4-8.14.1-160000.4.1.s390x",
"product_id": "libcurl-mini4-8.14.1-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.s390x",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.s390x",
"product_id": "libcurl4-8.14.1-160000.4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-160000.4.1.x86_64",
"product": {
"name": "curl-8.14.1-160000.4.1.x86_64",
"product_id": "curl-8.14.1-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-160000.4.1.x86_64",
"product": {
"name": "libcurl-devel-8.14.1-160000.4.1.x86_64",
"product_id": "libcurl-devel-8.14.1-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-160000.4.1.x86_64",
"product": {
"name": "libcurl-mini4-8.14.1-160000.4.1.x86_64",
"product_id": "libcurl-mini4-8.14.1-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-160000.4.1.x86_64",
"product": {
"name": "libcurl4-8.14.1-160000.4.1.x86_64",
"product_id": "libcurl4-8.14.1-160000.4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.aarch64"
},
"product_reference": "curl-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "curl-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.s390x"
},
"product_reference": "curl-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.x86_64"
},
"product_reference": "curl-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.14.1-160000.4.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch"
},
"product_reference": "curl-zsh-completion-8.14.1-160000.4.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.s390x"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.14.1-160000.4.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch"
},
"product_reference": "libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-mini4-8.14.1-160000.4.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64"
},
"product_reference": "libcurl-mini4-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-mini4-8.14.1-160000.4.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-mini4-8.14.1-160000.4.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x"
},
"product_reference": "libcurl-mini4-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-mini4-8.14.1-160000.4.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64"
},
"product_reference": "libcurl-mini4-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.s390x"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.aarch64"
},
"product_reference": "curl-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "curl-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.s390x"
},
"product_reference": "curl-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-160000.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.x86_64"
},
"product_reference": "curl-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-zsh-completion-8.14.1-160000.4.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch"
},
"product_reference": "curl-zsh-completion-8.14.1-160000.4.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.s390x"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-8.14.1-160000.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64"
},
"product_reference": "libcurl-devel-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-devel-doc-8.14.1-160000.4.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch"
},
"product_reference": "libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-mini4-8.14.1-160000.4.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64"
},
"product_reference": "libcurl-mini4-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-mini4-8.14.1-160000.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-mini4-8.14.1-160000.4.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x"
},
"product_reference": "libcurl-mini4-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl-mini4-8.14.1-160000.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64"
},
"product_reference": "libcurl-mini4-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.ppc64le"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.s390x"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-160000.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14017"
}
],
"notes": [
{
"category": "general",
"text": "When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl,\nchanging TLS options in one thread would inadvertently change them globally\nand therefore possibly also affect other concurrently setup transfers.\n\nDisabling certificate verification for a specific transfer could\nunintentionally disable the feature for other threads as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14017",
"url": "https://www.suse.com/security/cve/CVE-2025-14017"
},
{
"category": "external",
"summary": "SUSE Bug 1256105 for CVE-2025-14017",
"url": "https://bugzilla.suse.com/1256105"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T10:58:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-14017"
},
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T10:58:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T10:58:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T10:58:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:libcurl4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:curl-zsh-completion-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-devel-doc-8.14.1-160000.4.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl-mini4-8.14.1-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libcurl4-8.14.1-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-14T10:58:55Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
SUSE-SU-2026:0051-1
Vulnerability from csaf_suse - Published: 2026-01-07 09:28 - Updated: 2026-01-07 09:28| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\n- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).\n- CVE-2025-14819: libssh global knownhost override (bsc#1255732).\n- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).\n- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-51,SUSE-SUSE-MicroOS-5.2-2026-51",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0051-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0051-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260051-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0051-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023697.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE Bug 1255734",
"url": "https://bugzilla.suse.com/1255734"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-01-07T09:28:27Z",
"generator": {
"date": "2026-01-07T09:28:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0051-1",
"initial_release_date": "2026-01-07T09:28:27Z",
"revision_history": [
{
"date": "2026-01-07T09:28:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150200.4.97.1.aarch64",
"product": {
"name": "curl-8.14.1-150200.4.97.1.aarch64",
"product_id": "curl-8.14.1-150200.4.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150200.4.97.1.aarch64",
"product": {
"name": "libcurl-devel-8.14.1-150200.4.97.1.aarch64",
"product_id": "libcurl-devel-8.14.1-150200.4.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150200.4.97.1.aarch64",
"product": {
"name": "libcurl-mini4-8.14.1-150200.4.97.1.aarch64",
"product_id": "libcurl-mini4-8.14.1-150200.4.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150200.4.97.1.aarch64",
"product": {
"name": "libcurl4-8.14.1-150200.4.97.1.aarch64",
"product_id": "libcurl4-8.14.1-150200.4.97.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libcurl-devel-64bit-8.14.1-150200.4.97.1.aarch64_ilp32",
"product": {
"name": "libcurl-devel-64bit-8.14.1-150200.4.97.1.aarch64_ilp32",
"product_id": "libcurl-devel-64bit-8.14.1-150200.4.97.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libcurl4-64bit-8.14.1-150200.4.97.1.aarch64_ilp32",
"product": {
"name": "libcurl4-64bit-8.14.1-150200.4.97.1.aarch64_ilp32",
"product_id": "libcurl4-64bit-8.14.1-150200.4.97.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150200.4.97.1.i586",
"product": {
"name": "curl-8.14.1-150200.4.97.1.i586",
"product_id": "curl-8.14.1-150200.4.97.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150200.4.97.1.i586",
"product": {
"name": "libcurl-devel-8.14.1-150200.4.97.1.i586",
"product_id": "libcurl-devel-8.14.1-150200.4.97.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150200.4.97.1.i586",
"product": {
"name": "libcurl-mini4-8.14.1-150200.4.97.1.i586",
"product_id": "libcurl-mini4-8.14.1-150200.4.97.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150200.4.97.1.i586",
"product": {
"name": "libcurl4-8.14.1-150200.4.97.1.i586",
"product_id": "libcurl4-8.14.1-150200.4.97.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-fish-completion-8.14.1-150200.4.97.1.noarch",
"product": {
"name": "curl-fish-completion-8.14.1-150200.4.97.1.noarch",
"product_id": "curl-fish-completion-8.14.1-150200.4.97.1.noarch"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.14.1-150200.4.97.1.noarch",
"product": {
"name": "curl-zsh-completion-8.14.1-150200.4.97.1.noarch",
"product_id": "curl-zsh-completion-8.14.1-150200.4.97.1.noarch"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.14.1-150200.4.97.1.noarch",
"product": {
"name": "libcurl-devel-doc-8.14.1-150200.4.97.1.noarch",
"product_id": "libcurl-devel-doc-8.14.1-150200.4.97.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150200.4.97.1.ppc64le",
"product": {
"name": "curl-8.14.1-150200.4.97.1.ppc64le",
"product_id": "curl-8.14.1-150200.4.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150200.4.97.1.ppc64le",
"product": {
"name": "libcurl-devel-8.14.1-150200.4.97.1.ppc64le",
"product_id": "libcurl-devel-8.14.1-150200.4.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150200.4.97.1.ppc64le",
"product": {
"name": "libcurl-mini4-8.14.1-150200.4.97.1.ppc64le",
"product_id": "libcurl-mini4-8.14.1-150200.4.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150200.4.97.1.ppc64le",
"product": {
"name": "libcurl4-8.14.1-150200.4.97.1.ppc64le",
"product_id": "libcurl4-8.14.1-150200.4.97.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150200.4.97.1.s390x",
"product": {
"name": "curl-8.14.1-150200.4.97.1.s390x",
"product_id": "curl-8.14.1-150200.4.97.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150200.4.97.1.s390x",
"product": {
"name": "libcurl-devel-8.14.1-150200.4.97.1.s390x",
"product_id": "libcurl-devel-8.14.1-150200.4.97.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150200.4.97.1.s390x",
"product": {
"name": "libcurl-mini4-8.14.1-150200.4.97.1.s390x",
"product_id": "libcurl-mini4-8.14.1-150200.4.97.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150200.4.97.1.s390x",
"product": {
"name": "libcurl4-8.14.1-150200.4.97.1.s390x",
"product_id": "libcurl4-8.14.1-150200.4.97.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150200.4.97.1.x86_64",
"product": {
"name": "curl-8.14.1-150200.4.97.1.x86_64",
"product_id": "curl-8.14.1-150200.4.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150200.4.97.1.x86_64",
"product": {
"name": "libcurl-devel-8.14.1-150200.4.97.1.x86_64",
"product_id": "libcurl-devel-8.14.1-150200.4.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.14.1-150200.4.97.1.x86_64",
"product": {
"name": "libcurl-devel-32bit-8.14.1-150200.4.97.1.x86_64",
"product_id": "libcurl-devel-32bit-8.14.1-150200.4.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150200.4.97.1.x86_64",
"product": {
"name": "libcurl-mini4-8.14.1-150200.4.97.1.x86_64",
"product_id": "libcurl-mini4-8.14.1-150200.4.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150200.4.97.1.x86_64",
"product": {
"name": "libcurl4-8.14.1-150200.4.97.1.x86_64",
"product_id": "libcurl4-8.14.1-150200.4.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.14.1-150200.4.97.1.x86_64",
"product": {
"name": "libcurl4-32bit-8.14.1-150200.4.97.1.x86_64",
"product_id": "libcurl4-32bit-8.14.1-150200.4.97.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150200.4.97.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64"
},
"product_reference": "curl-8.14.1-150200.4.97.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150200.4.97.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x"
},
"product_reference": "curl-8.14.1-150200.4.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150200.4.97.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64"
},
"product_reference": "curl-8.14.1-150200.4.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150200.4.97.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-150200.4.97.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150200.4.97.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x"
},
"product_reference": "libcurl4-8.14.1-150200.4.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150200.4.97.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-150200.4.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:27Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:27Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:27Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:curl-8.14.1-150200.4.97.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libcurl4-8.14.1-150200.4.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T09:28:27Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
SUSE-SU-2026:0508-1
Vulnerability from csaf_suse - Published: 2026-02-13 14:50 - Updated: 2026-02-13 14:50| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\n- CVE-2025-14017: Fixed broken TLS options for threaded LDAPS (bsc#1256105).\n- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).\n- CVE-2025-14819: libssh global knownhost override (bsc#1255732).\n- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).\n- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-508,SUSE-SLE-Micro-5.3-2026-508,SUSE-SLE-Micro-5.4-2026-508,SUSE-SLE-Micro-5.5-2026-508",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0508-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0508-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260508-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0508-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024240.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE Bug 1255734",
"url": "https://bugzilla.suse.com/1255734"
},
{
"category": "self",
"summary": "SUSE Bug 1256105",
"url": "https://bugzilla.suse.com/1256105"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14017 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-02-13T14:50:33Z",
"generator": {
"date": "2026-02-13T14:50:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0508-1",
"initial_release_date": "2026-02-13T14:50:33Z",
"revision_history": [
{
"date": "2026-02-13T14:50:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150400.5.77.1.aarch64",
"product": {
"name": "curl-8.14.1-150400.5.77.1.aarch64",
"product_id": "curl-8.14.1-150400.5.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150400.5.77.1.aarch64",
"product": {
"name": "libcurl-devel-8.14.1-150400.5.77.1.aarch64",
"product_id": "libcurl-devel-8.14.1-150400.5.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150400.5.77.1.aarch64",
"product": {
"name": "libcurl-mini4-8.14.1-150400.5.77.1.aarch64",
"product_id": "libcurl-mini4-8.14.1-150400.5.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150400.5.77.1.aarch64",
"product": {
"name": "libcurl4-8.14.1-150400.5.77.1.aarch64",
"product_id": "libcurl4-8.14.1-150400.5.77.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libcurl-devel-64bit-8.14.1-150400.5.77.1.aarch64_ilp32",
"product": {
"name": "libcurl-devel-64bit-8.14.1-150400.5.77.1.aarch64_ilp32",
"product_id": "libcurl-devel-64bit-8.14.1-150400.5.77.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libcurl4-64bit-8.14.1-150400.5.77.1.aarch64_ilp32",
"product": {
"name": "libcurl4-64bit-8.14.1-150400.5.77.1.aarch64_ilp32",
"product_id": "libcurl4-64bit-8.14.1-150400.5.77.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150400.5.77.1.i586",
"product": {
"name": "curl-8.14.1-150400.5.77.1.i586",
"product_id": "curl-8.14.1-150400.5.77.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150400.5.77.1.i586",
"product": {
"name": "libcurl-devel-8.14.1-150400.5.77.1.i586",
"product_id": "libcurl-devel-8.14.1-150400.5.77.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150400.5.77.1.i586",
"product": {
"name": "libcurl-mini4-8.14.1-150400.5.77.1.i586",
"product_id": "libcurl-mini4-8.14.1-150400.5.77.1.i586"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150400.5.77.1.i586",
"product": {
"name": "libcurl4-8.14.1-150400.5.77.1.i586",
"product_id": "libcurl4-8.14.1-150400.5.77.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-fish-completion-8.14.1-150400.5.77.1.noarch",
"product": {
"name": "curl-fish-completion-8.14.1-150400.5.77.1.noarch",
"product_id": "curl-fish-completion-8.14.1-150400.5.77.1.noarch"
}
},
{
"category": "product_version",
"name": "curl-zsh-completion-8.14.1-150400.5.77.1.noarch",
"product": {
"name": "curl-zsh-completion-8.14.1-150400.5.77.1.noarch",
"product_id": "curl-zsh-completion-8.14.1-150400.5.77.1.noarch"
}
},
{
"category": "product_version",
"name": "libcurl-devel-doc-8.14.1-150400.5.77.1.noarch",
"product": {
"name": "libcurl-devel-doc-8.14.1-150400.5.77.1.noarch",
"product_id": "libcurl-devel-doc-8.14.1-150400.5.77.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150400.5.77.1.ppc64le",
"product": {
"name": "curl-8.14.1-150400.5.77.1.ppc64le",
"product_id": "curl-8.14.1-150400.5.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150400.5.77.1.ppc64le",
"product": {
"name": "libcurl-devel-8.14.1-150400.5.77.1.ppc64le",
"product_id": "libcurl-devel-8.14.1-150400.5.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150400.5.77.1.ppc64le",
"product": {
"name": "libcurl-mini4-8.14.1-150400.5.77.1.ppc64le",
"product_id": "libcurl-mini4-8.14.1-150400.5.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150400.5.77.1.ppc64le",
"product": {
"name": "libcurl4-8.14.1-150400.5.77.1.ppc64le",
"product_id": "libcurl4-8.14.1-150400.5.77.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150400.5.77.1.s390x",
"product": {
"name": "curl-8.14.1-150400.5.77.1.s390x",
"product_id": "curl-8.14.1-150400.5.77.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150400.5.77.1.s390x",
"product": {
"name": "libcurl-devel-8.14.1-150400.5.77.1.s390x",
"product_id": "libcurl-devel-8.14.1-150400.5.77.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150400.5.77.1.s390x",
"product": {
"name": "libcurl-mini4-8.14.1-150400.5.77.1.s390x",
"product_id": "libcurl-mini4-8.14.1-150400.5.77.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150400.5.77.1.s390x",
"product": {
"name": "libcurl4-8.14.1-150400.5.77.1.s390x",
"product_id": "libcurl4-8.14.1-150400.5.77.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-150400.5.77.1.x86_64",
"product": {
"name": "curl-8.14.1-150400.5.77.1.x86_64",
"product_id": "curl-8.14.1-150400.5.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-8.14.1-150400.5.77.1.x86_64",
"product": {
"name": "libcurl-devel-8.14.1-150400.5.77.1.x86_64",
"product_id": "libcurl-devel-8.14.1-150400.5.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-devel-32bit-8.14.1-150400.5.77.1.x86_64",
"product": {
"name": "libcurl-devel-32bit-8.14.1-150400.5.77.1.x86_64",
"product_id": "libcurl-devel-32bit-8.14.1-150400.5.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl-mini4-8.14.1-150400.5.77.1.x86_64",
"product": {
"name": "libcurl-mini4-8.14.1-150400.5.77.1.x86_64",
"product_id": "libcurl-mini4-8.14.1-150400.5.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-150400.5.77.1.x86_64",
"product": {
"name": "libcurl4-8.14.1-150400.5.77.1.x86_64",
"product_id": "libcurl4-8.14.1-150400.5.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-32bit-8.14.1-150400.5.77.1.x86_64",
"product": {
"name": "libcurl4-32bit-8.14.1-150400.5.77.1.x86_64",
"product_id": "libcurl4-32bit-8.14.1-150400.5.77.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150400.5.77.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.aarch64"
},
"product_reference": "curl-8.14.1-150400.5.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150400.5.77.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.s390x"
},
"product_reference": "curl-8.14.1-150400.5.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150400.5.77.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.x86_64"
},
"product_reference": "curl-8.14.1-150400.5.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150400.5.77.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-150400.5.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150400.5.77.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.s390x"
},
"product_reference": "libcurl4-8.14.1-150400.5.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150400.5.77.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-150400.5.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150400.5.77.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.aarch64"
},
"product_reference": "curl-8.14.1-150400.5.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150400.5.77.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.s390x"
},
"product_reference": "curl-8.14.1-150400.5.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150400.5.77.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.x86_64"
},
"product_reference": "curl-8.14.1-150400.5.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150400.5.77.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-150400.5.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150400.5.77.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.s390x"
},
"product_reference": "libcurl4-8.14.1-150400.5.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150400.5.77.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-150400.5.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150400.5.77.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.aarch64"
},
"product_reference": "curl-8.14.1-150400.5.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150400.5.77.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.ppc64le"
},
"product_reference": "curl-8.14.1-150400.5.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150400.5.77.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.s390x"
},
"product_reference": "curl-8.14.1-150400.5.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-150400.5.77.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.x86_64"
},
"product_reference": "curl-8.14.1-150400.5.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150400.5.77.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-150400.5.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150400.5.77.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.ppc64le"
},
"product_reference": "libcurl4-8.14.1-150400.5.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150400.5.77.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.s390x"
},
"product_reference": "libcurl4-8.14.1-150400.5.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-150400.5.77.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-150400.5.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14017"
}
],
"notes": [
{
"category": "general",
"text": "When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl,\nchanging TLS options in one thread would inadvertently change them globally\nand therefore possibly also affect other concurrently setup transfers.\n\nDisabling certificate verification for a specific transfer could\nunintentionally disable the feature for other threads as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14017",
"url": "https://www.suse.com/security/cve/CVE-2025-14017"
},
{
"category": "external",
"summary": "SUSE Bug 1256105 for CVE-2025-14017",
"url": "https://bugzilla.suse.com/1256105"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-13T14:50:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-14017"
},
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-13T14:50:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-13T14:50:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-13T14:50:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libcurl4-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:curl-8.14.1-150400.5.77.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libcurl4-8.14.1-150400.5.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-13T14:50:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
SUSE-SU-2026:20042-1
Vulnerability from csaf_suse - Published: 2026-01-08 15:18 - Updated: 2026-01-08 15:18| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for curl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for curl fixes the following issues:\n\n- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).\n- CVE-2025-14819: libssh global knownhost override (bsc#1255732).\n- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).\n- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-546",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20042-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20042-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620042-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20042-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023765.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255731",
"url": "https://bugzilla.suse.com/1255731"
},
{
"category": "self",
"summary": "SUSE Bug 1255732",
"url": "https://bugzilla.suse.com/1255732"
},
{
"category": "self",
"summary": "SUSE Bug 1255733",
"url": "https://bugzilla.suse.com/1255733"
},
{
"category": "self",
"summary": "SUSE Bug 1255734",
"url": "https://bugzilla.suse.com/1255734"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-15224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-15224/"
}
],
"title": "Security update for curl",
"tracking": {
"current_release_date": "2026-01-08T15:18:54Z",
"generator": {
"date": "2026-01-08T15:18:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20042-1",
"initial_release_date": "2026-01-08T15:18:54Z",
"revision_history": [
{
"date": "2026-01-08T15:18:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-3.1.aarch64",
"product": {
"name": "curl-8.14.1-3.1.aarch64",
"product_id": "curl-8.14.1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-3.1.aarch64",
"product": {
"name": "libcurl4-8.14.1-3.1.aarch64",
"product_id": "libcurl4-8.14.1-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-3.1.s390x",
"product": {
"name": "curl-8.14.1-3.1.s390x",
"product_id": "curl-8.14.1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-3.1.s390x",
"product": {
"name": "libcurl4-8.14.1-3.1.s390x",
"product_id": "libcurl4-8.14.1-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "curl-8.14.1-3.1.x86_64",
"product": {
"name": "curl-8.14.1-3.1.x86_64",
"product_id": "curl-8.14.1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcurl4-8.14.1-3.1.x86_64",
"product": {
"name": "libcurl4-8.14.1-3.1.x86_64",
"product_id": "libcurl4-8.14.1-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-3.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:curl-8.14.1-3.1.aarch64"
},
"product_reference": "curl-8.14.1-3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-3.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:curl-8.14.1-3.1.s390x"
},
"product_reference": "curl-8.14.1-3.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "curl-8.14.1-3.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:curl-8.14.1-3.1.x86_64"
},
"product_reference": "curl-8.14.1-3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-3.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.aarch64"
},
"product_reference": "libcurl4-8.14.1-3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-3.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.s390x"
},
"product_reference": "libcurl4-8.14.1-3.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcurl4-8.14.1-3.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.x86_64"
},
"product_reference": "libcurl4-8.14.1-3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14524"
}
],
"notes": [
{
"category": "general",
"text": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14524",
"url": "https://www.suse.com/security/cve/CVE-2025-14524"
},
{
"category": "external",
"summary": "SUSE Bug 1255731 for CVE-2025-14524",
"url": "https://bugzilla.suse.com/1255731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T15:18:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14819"
}
],
"notes": [
{
"category": "general",
"text": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14819",
"url": "https://www.suse.com/security/cve/CVE-2025-14819"
},
{
"category": "external",
"summary": "SUSE Bug 1255732 for CVE-2025-14819",
"url": "https://bugzilla.suse.com/1255732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T15:18:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15079"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15079",
"url": "https://www.suse.com/security/cve/CVE-2025-15079"
},
{
"category": "external",
"summary": "SUSE Bug 1255733 for CVE-2025-15079",
"url": "https://bugzilla.suse.com/1255733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T15:18:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-15224"
}
],
"notes": [
{
"category": "general",
"text": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-15224",
"url": "https://www.suse.com/security/cve/CVE-2025-15224"
},
{
"category": "external",
"summary": "SUSE Bug 1255734 for CVE-2025-15224",
"url": "https://bugzilla.suse.com/1255734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:curl-8.14.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.s390x",
"SUSE Linux Micro 6.0:libcurl4-8.14.1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T15:18:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-15224"
}
]
}
WID-SEC-W-2026-0030
Vulnerability from csaf_certbund - Published: 2026-01-06 23:00 - Updated: 2026-02-15 23:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "cURL ist eine Client-Software, die das Austauschen von Dateien mittels mehrerer Protokolle wie z. B. HTTP oder FTP erlaubt.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in cURL ausnutzen, um Sicherheitsvorkehrungen zu umgehen oder vertrauliche Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0030 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0030.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0030 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0030"
},
{
"category": "external",
"summary": "Project curl Security Advisory vom 2026-01-06",
"url": "https://curl.se/docs/CVE-2025-15224.html"
},
{
"category": "external",
"summary": "Project curl Security Advisory vom 2026-01-06",
"url": "https://curl.se/docs/CVE-2025-15079.html"
},
{
"category": "external",
"summary": "Project curl Security Advisory vom 2026-01-06",
"url": "https://curl.se/docs/CVE-2025-14819.html"
},
{
"category": "external",
"summary": "Project curl Security Advisory vom 2026-01-06",
"url": "https://curl.se/docs/CVE-2025-14524.html"
},
{
"category": "external",
"summary": "Project curl Security Advisory vom 2026-01-06",
"url": "https://curl.se/docs/CVE-2025-14017.html"
},
{
"category": "external",
"summary": "Project curl Security Advisory vom 2026-01-06",
"url": "https://curl.se/docs/CVE-2025-13034.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0050-1 vom 2026-01-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023698.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0052-1 vom 2026-01-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023696.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0051-1 vom 2026-01-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023697.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0066-1 vom 2026-01-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023711.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0077-1 vom 2026-01-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCUZ47ZAPZKRFVFRPWIPP3KM2XGIRDMB/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0078-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023713.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10017-1 vom 2026-01-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOOXMCTVUTDBJAD5HQRMQVZJRZJF2ZXZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0119-1 vom 2026-01-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023738.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20062-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023749.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20042-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023765.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20031-1 vom 2026-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSLWWKBPXO4RTMMBYCCKFIGY2YFQPHSX/"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2026-E27B23AF78 vom 2026-01-20",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-e27b23af78"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2026-3F0F0F85BE vom 2026-01-20",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-3f0f0f85be"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20082-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023816.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0221-1 vom 2026-01-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023864.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20110-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023878.html"
},
{
"category": "external",
"summary": "Tenable Security Advisory TNS-2026-02 vom 2026-01-27",
"url": "https://de.tenable.com/security/tns-2026-02"
},
{
"category": "external",
"summary": "Meinberg Security Advisory MBGSA-2026.02 vom 2026-02-10",
"url": "http://news.meinberg.de/664/"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20260213-0015 vom 2026-02-13",
"url": "https://security.netapp.com/advisory/NTAP-20260213-0015"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0508-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024240.html"
}
],
"source_lang": "en-US",
"title": "cURL: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-15T23:00:00.000+00:00",
"generator": {
"date": "2026-02-16T11:20:49.128+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0030",
"initial_release_date": "2026-01-06T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-01-06T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-01-07T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-08T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE und European Union Vulnerability Database aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
},
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-15T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-22T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Tenable aufgenommen"
},
{
"date": "2026-02-10T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Meinberg aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "14"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.10.008",
"product": {
"name": "Meinberg LANTIME \u003c7.10.008",
"product_id": "T050722"
}
},
{
"category": "product_version",
"name": "7.10.008",
"product": {
"name": "Meinberg LANTIME 7.10.008",
"product_id": "T050722-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:meinberg:lantime:7.10.008"
}
}
}
],
"category": "product_name",
"name": "LANTIME"
}
],
"category": "vendor",
"name": "Meinberg"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "9",
"product": {
"name": "NetApp Data ONTAP 9",
"product_id": "T039981",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:data_ontap:9"
}
}
}
],
"category": "product_name",
"name": "Data ONTAP"
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.18.0",
"product": {
"name": "Open Source cURL \u003c8.18.0",
"product_id": "T049738"
}
},
{
"category": "product_version",
"name": "8.18.0",
"product": {
"name": "Open Source cURL 8.18.0",
"product_id": "T049738-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:curl:curl:8.18.0"
}
}
}
],
"category": "product_name",
"name": "cURL"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.5.3",
"product": {
"name": "Tenable Security Nessus Network Monitor \u003c6.5.3",
"product_id": "T050330"
}
},
{
"category": "product_version",
"name": "6.5.3",
"product": {
"name": "Tenable Security Nessus Network Monitor 6.5.3",
"product_id": "T050330-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:tenable:nessus_network_monitor:6.5.3"
}
}
}
],
"category": "product_name",
"name": "Nessus Network Monitor"
}
],
"category": "vendor",
"name": "Tenable Security"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13034",
"product_status": {
"known_affected": [
"T049738",
"T002207",
"T050722",
"T027843",
"T050330",
"T039981",
"74185"
]
},
"release_date": "2026-01-06T23:00:00.000+00:00",
"title": "CVE-2025-13034"
},
{
"cve": "CVE-2025-14017",
"product_status": {
"known_affected": [
"T049738",
"T002207",
"T050722",
"T027843",
"T050330",
"T039981",
"74185"
]
},
"release_date": "2026-01-06T23:00:00.000+00:00",
"title": "CVE-2025-14017"
},
{
"cve": "CVE-2025-14524",
"product_status": {
"known_affected": [
"T049738",
"T002207",
"T050722",
"T027843",
"T050330",
"T039981",
"74185"
]
},
"release_date": "2026-01-06T23:00:00.000+00:00",
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-14819",
"product_status": {
"known_affected": [
"T049738",
"T002207",
"T050722",
"T027843",
"T050330",
"T039981",
"74185"
]
},
"release_date": "2026-01-06T23:00:00.000+00:00",
"title": "CVE-2025-14819"
},
{
"cve": "CVE-2025-15079",
"product_status": {
"known_affected": [
"T049738",
"T002207",
"T050722",
"T027843",
"T050330",
"T039981",
"74185"
]
},
"release_date": "2026-01-06T23:00:00.000+00:00",
"title": "CVE-2025-15079"
},
{
"cve": "CVE-2025-15224",
"product_status": {
"known_affected": [
"T049738",
"T002207",
"T050722",
"T027843",
"T050330",
"T039981",
"74185"
]
},
"release_date": "2026-01-06T23:00:00.000+00:00",
"title": "CVE-2025-15224"
}
]
}
GHSA-VQHR-M87Q-9JQH
Vulnerability from github – Published: 2026-01-08 12:30 – Updated: 2026-01-08 15:31When doing TLS related transfers with reused easy or multi handles and
altering the CURLSSLOPT_NO_PARTIALCHAIN option, libcurl could accidentally
reuse a CA store cached in memory for which the partial chain option was
reversed. Contrary to the user's wishes and expectations. This could make
libcurl find and accept a trust chain that it otherwise would not.
{
"affected": [],
"aliases": [
"CVE-2025-14819"
],
"database_specific": {
"cwe_ids": [
"CWE-295"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-01-08T10:15:46Z",
"severity": "MODERATE"
},
"details": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
"id": "GHSA-vqhr-m87q-9jqh",
"modified": "2026-01-08T15:31:25Z",
"published": "2026-01-08T12:30:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14819"
},
{
"type": "WEB",
"url": "https://curl.se/docs/CVE-2025-14819.html"
},
{
"type": "WEB",
"url": "https://curl.se/docs/CVE-2025-14819.json"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/01/07/5"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2025-14819
Vulnerability from fkie_nvd - Published: 2026-01-08 10:15 - Updated: 2026-01-20 14:51| URL | Tags | ||
|---|---|---|---|
| 2499f714-1537-4658-8207-48ae4bb9eae9 | https://curl.se/docs/CVE-2025-14819.html | Vendor Advisory, Mitigation, Patch | |
| 2499f714-1537-4658-8207-48ae4bb9eae9 | https://curl.se/docs/CVE-2025-14819.json | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2026/01/07/5 | Mailing List, Third Party Advisory, Mitigation, Patch |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83978599-3111-4F13-BFAE-1B0423D8A75F",
"versionEndExcluding": "8.18.0",
"versionStartIncluding": "7.87.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user\u0027s wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not."
}
],
"id": "CVE-2025-14819",
"lastModified": "2026-01-20T14:51:26.263",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-01-08T10:15:46.730",
"references": [
{
"source": "2499f714-1537-4658-8207-48ae4bb9eae9",
"tags": [
"Vendor Advisory",
"Mitigation",
"Patch"
],
"url": "https://curl.se/docs/CVE-2025-14819.html"
},
{
"source": "2499f714-1537-4658-8207-48ae4bb9eae9",
"tags": [
"Vendor Advisory"
],
"url": "https://curl.se/docs/CVE-2025-14819.json"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory",
"Mitigation",
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2026/01/07/5"
}
],
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-295"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
MSRC_CVE-2025-14819
Vulnerability from csaf_microsoft - Published: 2026-01-02 00:00 - Updated: 2026-02-21 03:37| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-14819 OpenSSL partial chain store policy bypass - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2025-14819.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "OpenSSL partial chain store policy bypass",
"tracking": {
"current_release_date": "2026-02-21T03:37:04.000Z",
"generator": {
"date": "2026-02-21T04:55:07.544Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-14819",
"initial_release_date": "2026-01-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-01-09T01:09:22.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-01-10T01:01:16.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-01-11T01:05:37.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
},
{
"date": "2026-01-12T14:39:20.000Z",
"legacy_version": "4",
"number": "4",
"summary": "Information published."
},
{
"date": "2026-01-13T01:41:17.000Z",
"legacy_version": "5",
"number": "5",
"summary": "Information published."
},
{
"date": "2026-02-21T03:37:04.000Z",
"legacy_version": "6",
"number": "6",
"summary": "Information published."
}
],
"status": "final",
"version": "6"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"category": "product_name",
"name": "azl3 curl 8.11.1-4",
"product": {
"name": "azl3 curl 8.11.1-4",
"product_id": "14"
}
},
{
"category": "product_name",
"name": "cbl2 curl 8.8.0-7",
"product": {
"name": "cbl2 curl 8.8.0-7",
"product_id": "15"
}
},
{
"category": "product_name",
"name": "azl3 mysql 8.0.44-2",
"product": {
"name": "azl3 mysql 8.0.44-2",
"product_id": "11"
}
},
{
"category": "product_name",
"name": "cbl2 mysql 8.0.44-2",
"product": {
"name": "cbl2 mysql 8.0.44-2",
"product_id": "12"
}
},
{
"category": "product_name",
"name": "azl3 rust 1.75.0-22",
"product": {
"name": "azl3 rust 1.75.0-22",
"product_id": "10"
}
},
{
"category": "product_name",
"name": "azl3 rust 1.86.0-10",
"product": {
"name": "azl3 rust 1.86.0-10",
"product_id": "9"
}
},
{
"category": "product_name",
"name": "cbl2 rust 1.72.0-11",
"product": {
"name": "cbl2 rust 1.72.0-11",
"product_id": "13"
}
},
{
"category": "product_name",
"name": "azl3 curl 8.11.1-5",
"product": {
"name": "azl3 curl 8.11.1-5",
"product_id": "5"
}
},
{
"category": "product_name",
"name": "cbl2 rust 1.72.0-13",
"product": {
"name": "cbl2 rust 1.72.0-13",
"product_id": "3"
}
},
{
"category": "product_name",
"name": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "azl3 tensorflow 2.16.1-9",
"product_id": "16"
}
},
{
"category": "product_name",
"name": "cbl2 curl 8.8.0-8",
"product": {
"name": "cbl2 curl 8.8.0-8",
"product_id": "4"
}
},
{
"category": "product_name",
"name": "azl3 mysql 8.0.45-1",
"product": {
"name": "azl3 mysql 8.0.45-1",
"product_id": "2"
}
},
{
"category": "product_name",
"name": "cbl2 mysql 8.0.45-1",
"product": {
"name": "cbl2 mysql 8.0.45-1",
"product_id": "1"
}
},
{
"category": "product_name",
"name": "azl3 rust 1.75.0-24",
"product": {
"name": "azl3 rust 1.75.0-24",
"product_id": "7"
}
},
{
"category": "product_name",
"name": "azl3 rust 1.90.0-3",
"product": {
"name": "azl3 rust 1.90.0-3",
"product_id": "6"
}
},
{
"category": "product_name",
"name": "azl3 tensorflow 2.16.1-10",
"product": {
"name": "azl3 tensorflow 2.16.1-10",
"product_id": "8"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 curl 8.11.1-4 as a component of Azure Linux 3.0",
"product_id": "17084-14"
},
"product_reference": "14",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 curl 8.8.0-7 as a component of CBL Mariner 2.0",
"product_id": "17086-15"
},
"product_reference": "15",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 mysql 8.0.44-2 as a component of Azure Linux 3.0",
"product_id": "17084-11"
},
"product_reference": "11",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 mysql 8.0.44-2 as a component of CBL Mariner 2.0",
"product_id": "17086-12"
},
"product_reference": "12",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rust 1.75.0-22 as a component of Azure Linux 3.0",
"product_id": "17084-10"
},
"product_reference": "10",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rust 1.86.0-10 as a component of Azure Linux 3.0",
"product_id": "17084-9"
},
"product_reference": "9",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 rust 1.72.0-11 as a component of CBL Mariner 2.0",
"product_id": "17086-13"
},
"product_reference": "13",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 curl 8.11.1-5 as a component of Azure Linux 3.0",
"product_id": "17084-5"
},
"product_reference": "5",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 rust 1.72.0-13 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 2.16.1-9 as a component of Azure Linux 3.0",
"product_id": "17084-16"
},
"product_reference": "16",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 curl 8.8.0-8 as a component of CBL Mariner 2.0",
"product_id": "17086-4"
},
"product_reference": "4",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 mysql 8.0.45-1 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 mysql 8.0.45-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rust 1.75.0-24 as a component of Azure Linux 3.0",
"product_id": "17084-7"
},
"product_reference": "7",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rust 1.90.0-3 as a component of Azure Linux 3.0",
"product_id": "17084-6"
},
"product_reference": "6",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 2.16.1-10 as a component of Azure Linux 3.0",
"product_id": "17084-8"
},
"product_reference": "8",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14819",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-16",
"17084-8"
]
},
{
"label": "vulnerable_code_not_in_execute_path",
"product_ids": [
"17084-14",
"17086-15",
"17084-10",
"17084-9",
"17086-13",
"17084-5",
"17086-3",
"17086-4",
"17084-7",
"17084-6"
]
},
{
"label": "vulnerable_code_not_present",
"product_ids": [
"17084-11",
"17086-12",
"17084-2",
"17086-1"
]
}
],
"notes": [
{
"category": "general",
"text": "curl",
"title": "Assigning CNA"
}
],
"product_status": {
"known_not_affected": [
"17084-14",
"17086-15",
"17084-11",
"17086-12",
"17084-10",
"17084-9",
"17086-13",
"17084-5",
"17086-3",
"17084-16",
"17086-4",
"17084-2",
"17086-1",
"17084-7",
"17084-6",
"17084-8"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-14819 OpenSSL partial chain store policy bypass - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2025-14819.json"
}
],
"title": "OpenSSL partial chain store policy bypass"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.