<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">curl-8.16.0-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:16652</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-10-01T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-10-01T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-10-01T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">curl-8.16.0-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the curl-8.16.0-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-16652</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-10148/</URL>
      <Description>SUSE CVE CVE-2025-10148 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-9086/</URL>
      <Description>SUSE CVE CVE-2025-9086 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="curl-8.16.0-1.1">
      <FullProductName ProductID="curl-8.16.0-1.1">curl-8.16.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="curl-fish-completion-8.16.0-1.1">
      <FullProductName ProductID="curl-fish-completion-8.16.0-1.1">curl-fish-completion-8.16.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="curl-zsh-completion-8.16.0-1.1">
      <FullProductName ProductID="curl-zsh-completion-8.16.0-1.1">curl-zsh-completion-8.16.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-8.16.0-1.1">
      <FullProductName ProductID="libcurl-devel-8.16.0-1.1">libcurl-devel-8.16.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-32bit-8.16.0-1.1">
      <FullProductName ProductID="libcurl-devel-32bit-8.16.0-1.1">libcurl-devel-32bit-8.16.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-doc-8.16.0-1.1">
      <FullProductName ProductID="libcurl-devel-doc-8.16.0-1.1">libcurl-devel-doc-8.16.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-8.16.0-1.1">
      <FullProductName ProductID="libcurl4-8.16.0-1.1">libcurl4-8.16.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-32bit-8.16.0-1.1">
      <FullProductName ProductID="libcurl4-32bit-8.16.0-1.1">libcurl4-32bit-8.16.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="wcurl-8.16.0-1.1">
      <FullProductName ProductID="wcurl-8.16.0-1.1">wcurl-8.16.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="curl-8.16.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:curl-8.16.0-1.1">curl-8.16.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-fish-completion-8.16.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:curl-fish-completion-8.16.0-1.1">curl-fish-completion-8.16.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-zsh-completion-8.16.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:curl-zsh-completion-8.16.0-1.1">curl-zsh-completion-8.16.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-8.16.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl-devel-8.16.0-1.1">libcurl-devel-8.16.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-32bit-8.16.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl-devel-32bit-8.16.0-1.1">libcurl-devel-32bit-8.16.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-doc-8.16.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl-devel-doc-8.16.0-1.1">libcurl-devel-doc-8.16.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-8.16.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl4-8.16.0-1.1">libcurl4-8.16.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-32bit-8.16.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libcurl4-32bit-8.16.0-1.1">libcurl4-32bit-8.16.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="wcurl-8.16.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:wcurl-8.16.0-1.1">wcurl-8.16.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">curl's websocket code did not update the 32 bit mask pattern for each new
 outgoing frame as the specification says. Instead it used a fixed mask that
persisted and was used throughout the entire connection.

A predictable mask pattern allows for a malicious server to induce traffic
between the two communicating parties that could be interpreted by an involved
proxy (configured or transparent) as genuine, real, HTTP traffic with content
and thereby poison its cache. That cached poisoned content could then be
served to all users of that proxy.</Note>
    </Notes>
    <CVE>CVE-2025-10148</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-8.16.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:curl-fish-completion-8.16.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:curl-zsh-completion-8.16.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-8.16.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-8.16.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-doc-8.16.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-8.16.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-8.16.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wcurl-8.16.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-10148.html</URL>
        <Description>CVE-2025-10148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249348</URL>
        <Description>SUSE Bug 1249348</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">1. A cookie is set using the `secure` keyword for `https://target`
2. curl is redirected to or otherwise made to speak with `http://target` (same
   hostname, but using clear text HTTP) using the same cookie set
3. The same cookie name is set - but with just a slash as path (`path='/'`).
   Since this site is not secure, the cookie *should* just be ignored.
4. A bug in the path comparison logic makes curl read outside a heap buffer
   boundary

The bug either causes a crash or it potentially makes the comparison come to
the wrong conclusion and lets the clear-text site override the contents of the
secure cookie, contrary to expectations and depending on the memory contents
immediately following the single-byte allocation that holds the path.

The presumed and correct behavior would be to plainly ignore the second set of
the cookie since it was already set as secure on a secure host so overriding
it on an insecure host should not be okay.</Note>
    </Notes>
    <CVE>CVE-2025-9086</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:curl-8.16.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:curl-fish-completion-8.16.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:curl-zsh-completion-8.16.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-32bit-8.16.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-8.16.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl-devel-doc-8.16.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-32bit-8.16.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libcurl4-8.16.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wcurl-8.16.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-9086.html</URL>
        <Description>CVE-2025-9086</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249191</URL>
        <Description>SUSE Bug 1249191</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
