<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for curl</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:03198-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-09-12T12:15:10Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-09-12T12:15:10Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-09-12T12:15:10Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for curl</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for curl fixes the following issues:

Update to version 8.14.1 (jsc#PED-13055, jsc#PED-13056).    
    
Security issues fixed:

- CVE-2025-0665: eventfd double close can cause libcurl to act unreliably (bsc#1236589).
- CVE-2025-4947: QUIC certificate check is skipped with wolfSSL allows for MITM attacks (bsc#1243397).
- CVE-2025-5025: no QUIC certificate pinning with wolfSSL can lead to connections to impostor servers that are not
  easily noticed (bsc#1243706).
- CVE-2025-5399: bug in websocket code can cause libcurl to get trapped in an endless busy-loop when processing
  specially crafted packets (bsc#1243933).
- CVE-2024-6874: punycode conversions to/from IDN can leak stack content when libcurl is built to use the macidn IDN
  backend (bsc#1228260).
- CVE-2025-9086: bug in patch comparison logic when processing cookies can lead to out-of-bounds read in heap buffer
  (bsc#1249191).
- CVE-2025-10148: predictable websocket mask can lead to proxy cache poisoning by malicious server (bsc#1249348).

Other issues fixed:
    
- Fix wrong return code when --retry is used (bsc#1249367).
  * tool_operate: fix return code when --retry is used but not triggered [b42776b]
    
- Fix the --ftp-pasv option in curl v8.14.1 (bsc#1246197).
  * tool_getparam: fix --ftp-pasv [5f805ee]

- Fixed with version 8.14.1:
  * TLS: add CURLOPT_SSL_SIGNATURE_ALGORITHMS and --sigalgs.
  * websocket: add option to disable auto-pong reply.
  * huge number of bugfixes.

  Please see https://curl.se/ch/ for full changelogs.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container bci/golang:latest-2025-3198,Container bci/kiwi:latest-2025-3198,Container bci/spack:0.23-2025-3198,Container bci/spack:latest-2025-3198,Container private-registry/harbor-trivy-adapter:latest-2025-3198,Container suse/git:latest-2025-3198,Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest-2025-3198,Container suse/sle15:latest-2025-3198,SUSE-2025-3198,SUSE-SLE-Module-Basesystem-15-SP6-2025-3198,SUSE-SLE-Module-Basesystem-15-SP7-2025-3198,openSUSE-SLE-15.6-2025-3198</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503198-1/</URL>
      <Description>Link for SUSE-SU-2025:03198-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-September/041687.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:03198-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228260</URL>
      <Description>SUSE Bug 1228260</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236589</URL>
      <Description>SUSE Bug 1236589</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243397</URL>
      <Description>SUSE Bug 1243397</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243706</URL>
      <Description>SUSE Bug 1243706</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243933</URL>
      <Description>SUSE Bug 1243933</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246197</URL>
      <Description>SUSE Bug 1246197</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1249191</URL>
      <Description>SUSE Bug 1249191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1249348</URL>
      <Description>SUSE Bug 1249348</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1249367</URL>
      <Description>SUSE Bug 1249367</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-6874/</URL>
      <Description>SUSE CVE CVE-2024-6874 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-0665/</URL>
      <Description>SUSE CVE CVE-2025-0665 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-10148/</URL>
      <Description>SUSE CVE CVE-2025-10148 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-4947/</URL>
      <Description>SUSE CVE CVE-2025-4947 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5025/</URL>
      <Description>SUSE CVE CVE-2025-5025 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5399/</URL>
      <Description>SUSE CVE CVE-2025-5399 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-9086/</URL>
      <Description>SUSE CVE CVE-2025-9086 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container bci/golang:latest">
      <Branch Type="Product Name" Name="Container bci/golang:latest">
        <FullProductName ProductID="Container bci/golang:latest">Container bci/golang:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container bci/kiwi:latest">
      <Branch Type="Product Name" Name="Container bci/kiwi:latest">
        <FullProductName ProductID="Container bci/kiwi:latest">Container bci/kiwi:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container bci/spack:0.23">
      <Branch Type="Product Name" Name="Container bci/spack:0.23">
        <FullProductName ProductID="Container bci/spack:0.23">Container bci/spack:0.23</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container bci/spack:latest">
      <Branch Type="Product Name" Name="Container bci/spack:latest">
        <FullProductName ProductID="Container bci/spack:latest">Container bci/spack:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container private-registry/harbor-trivy-adapter:latest">
      <Branch Type="Product Name" Name="Container private-registry/harbor-trivy-adapter:latest">
        <FullProductName ProductID="Container private-registry/harbor-trivy-adapter:latest">Container private-registry/harbor-trivy-adapter:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/git:latest">
      <Branch Type="Product Name" Name="Container suse/git:latest">
        <FullProductName ProductID="Container suse/git:latest">Container suse/git:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest">
      <Branch Type="Product Name" Name="Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest">
        <FullProductName ProductID="Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest">Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/sle15:latest">
      <Branch Type="Product Name" Name="Container suse/sle15:latest">
        <FullProductName ProductID="Container suse/sle15:latest">Container suse/sle15:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP6" CPE="cpe:/o:suse:sle-module-basesystem:15:sp6">SUSE Linux Enterprise Module for Basesystem 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP7">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7" CPE="cpe:/o:suse:sle-module-basesystem:15:sp7">SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="curl-8.14.1-150600.4.28.1">
      <FullProductName ProductID="curl-8.14.1-150600.4.28.1">curl-8.14.1-150600.4.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-8.14.1-150600.4.28.1">
      <FullProductName ProductID="libcurl4-8.14.1-150600.4.28.1">libcurl4-8.14.1-150600.4.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-8.14.1-150600.4.28.1">
      <FullProductName ProductID="libcurl-devel-8.14.1-150600.4.28.1">libcurl-devel-8.14.1-150600.4.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="curl-fish-completion-8.14.1-150600.4.28.1">
      <FullProductName ProductID="curl-fish-completion-8.14.1-150600.4.28.1">curl-fish-completion-8.14.1-150600.4.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="curl-zsh-completion-8.14.1-150600.4.28.1">
      <FullProductName ProductID="curl-zsh-completion-8.14.1-150600.4.28.1">curl-zsh-completion-8.14.1-150600.4.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-32bit-8.14.1-150600.4.28.1">
      <FullProductName ProductID="libcurl-devel-32bit-8.14.1-150600.4.28.1">libcurl-devel-32bit-8.14.1-150600.4.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-64bit-8.14.1-150600.4.28.1">
      <FullProductName ProductID="libcurl-devel-64bit-8.14.1-150600.4.28.1">libcurl-devel-64bit-8.14.1-150600.4.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-doc-8.14.1-150600.4.28.1">
      <FullProductName ProductID="libcurl-devel-doc-8.14.1-150600.4.28.1">libcurl-devel-doc-8.14.1-150600.4.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-mini4-8.14.1-150600.4.28.1">
      <FullProductName ProductID="libcurl-mini4-8.14.1-150600.4.28.1">libcurl-mini4-8.14.1-150600.4.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-32bit-8.14.1-150600.4.28.1">
      <FullProductName ProductID="libcurl4-32bit-8.14.1-150600.4.28.1">libcurl4-32bit-8.14.1-150600.4.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-64bit-8.14.1-150600.4.28.1">
      <FullProductName ProductID="libcurl4-64bit-8.14.1-150600.4.28.1">libcurl4-64bit-8.14.1-150600.4.28.1</FullProductName>
    </Branch>
    <Relationship ProductReference="curl-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="Container bci/golang:latest">
      <FullProductName ProductID="Container bci/golang:latest:curl-8.14.1-150600.4.28.1">curl-8.14.1-150600.4.28.1 as a component of Container bci/golang:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="Container bci/golang:latest">
      <FullProductName ProductID="Container bci/golang:latest:libcurl4-8.14.1-150600.4.28.1">libcurl4-8.14.1-150600.4.28.1 as a component of Container bci/golang:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="Container bci/kiwi:latest">
      <FullProductName ProductID="Container bci/kiwi:latest:curl-8.14.1-150600.4.28.1">curl-8.14.1-150600.4.28.1 as a component of Container bci/kiwi:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="Container bci/kiwi:latest">
      <FullProductName ProductID="Container bci/kiwi:latest:libcurl4-8.14.1-150600.4.28.1">libcurl4-8.14.1-150600.4.28.1 as a component of Container bci/kiwi:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="Container bci/spack:0.23">
      <FullProductName ProductID="Container bci/spack:0.23:curl-8.14.1-150600.4.28.1">curl-8.14.1-150600.4.28.1 as a component of Container bci/spack:0.23</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="Container bci/spack:0.23">
      <FullProductName ProductID="Container bci/spack:0.23:libcurl-devel-8.14.1-150600.4.28.1">libcurl-devel-8.14.1-150600.4.28.1 as a component of Container bci/spack:0.23</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="Container bci/spack:0.23">
      <FullProductName ProductID="Container bci/spack:0.23:libcurl4-8.14.1-150600.4.28.1">libcurl4-8.14.1-150600.4.28.1 as a component of Container bci/spack:0.23</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="Container bci/spack:latest">
      <FullProductName ProductID="Container bci/spack:latest:curl-8.14.1-150600.4.28.1">curl-8.14.1-150600.4.28.1 as a component of Container bci/spack:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="Container bci/spack:latest">
      <FullProductName ProductID="Container bci/spack:latest:libcurl-devel-8.14.1-150600.4.28.1">libcurl-devel-8.14.1-150600.4.28.1 as a component of Container bci/spack:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="Container bci/spack:latest">
      <FullProductName ProductID="Container bci/spack:latest:libcurl4-8.14.1-150600.4.28.1">libcurl4-8.14.1-150600.4.28.1 as a component of Container bci/spack:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="Container private-registry/harbor-trivy-adapter:latest">
      <FullProductName ProductID="Container private-registry/harbor-trivy-adapter:latest:libcurl4-8.14.1-150600.4.28.1">libcurl4-8.14.1-150600.4.28.1 as a component of Container private-registry/harbor-trivy-adapter:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/git:latest">
      <FullProductName ProductID="Container suse/git:latest:libcurl4-8.14.1-150600.4.28.1">libcurl4-8.14.1-150600.4.28.1 as a component of Container suse/git:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest">
      <FullProductName ProductID="Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:curl-8.14.1-150600.4.28.1">curl-8.14.1-150600.4.28.1 as a component of Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest">
      <FullProductName ProductID="Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:libcurl4-8.14.1-150600.4.28.1">libcurl4-8.14.1-150600.4.28.1 as a component of Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle15:latest">
      <FullProductName ProductID="Container suse/sle15:latest:curl-8.14.1-150600.4.28.1">curl-8.14.1-150600.4.28.1 as a component of Container suse/sle15:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle15:latest">
      <FullProductName ProductID="Container suse/sle15:latest:libcurl4-8.14.1-150600.4.28.1">libcurl4-8.14.1-150600.4.28.1 as a component of Container suse/sle15:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.14.1-150600.4.28.1">curl-8.14.1-150600.4.28.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.14.1-150600.4.28.1">libcurl-devel-8.14.1-150600.4.28.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.14.1-150600.4.28.1">libcurl4-8.14.1-150600.4.28.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-32bit-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-32bit-8.14.1-150600.4.28.1">libcurl4-32bit-8.14.1-150600.4.28.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150600.4.28.1">curl-8.14.1-150600.4.28.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150600.4.28.1">libcurl-devel-8.14.1-150600.4.28.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150600.4.28.1">libcurl4-8.14.1-150600.4.28.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-32bit-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150600.4.28.1">libcurl4-32bit-8.14.1-150600.4.28.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:curl-8.14.1-150600.4.28.1">curl-8.14.1-150600.4.28.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.28.1">libcurl-devel-8.14.1-150600.4.28.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-32bit-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.28.1">libcurl-devel-32bit-8.14.1-150600.4.28.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.28.1">libcurl4-8.14.1-150600.4.28.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-32bit-8.14.1-150600.4.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.28.1">libcurl4-32bit-8.14.1-150600.4.28.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libcurl's URL API function
[curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) offers punycode
conversions, to and from IDN. Asking to convert a name that is exactly 256
bytes, libcurl ends up reading outside of a stack based buffer when built to
use the *macidn* IDN backend. The conversion function then fills up the
provided buffer exactly - but does not null terminate the string.

This flaw can lead to stack contents accidently getting returned as part of
the converted string.</Note>
    </Notes>
    <CVE>CVE-2024-6874</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container bci/golang:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/golang:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/kiwi:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/kiwi:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container private-registry/harbor-trivy-adapter:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/git:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/sle15:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/sle15:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503198-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-6874.html</URL>
        <Description>CVE-2024-6874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228260</URL>
        <Description>SUSE Bug 1228260</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libcurl would wrongly close the same eventfd file descriptor twice when taking
down a connection channel after having completed a threaded name resolve.</Note>
    </Notes>
    <CVE>CVE-2025-0665</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container bci/golang:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/golang:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/kiwi:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/kiwi:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container private-registry/harbor-trivy-adapter:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/git:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/sle15:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/sle15:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503198-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-0665.html</URL>
        <Description>CVE-2025-0665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236589</URL>
        <Description>SUSE Bug 1236589</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">curl's websocket code did not update the 32 bit mask pattern for each new
 outgoing frame as the specification says. Instead it used a fixed mask that
persisted and was used throughout the entire connection.

A predictable mask pattern allows for a malicious server to induce traffic
between the two communicating parties that could be interpreted by an involved
proxy (configured or transparent) as genuine, real, HTTP traffic with content
and thereby poison its cache. That cached poisoned content could then be
served to all users of that proxy.</Note>
    </Notes>
    <CVE>CVE-2025-10148</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container bci/golang:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/golang:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/kiwi:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/kiwi:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container private-registry/harbor-trivy-adapter:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/git:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/sle15:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/sle15:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503198-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-10148.html</URL>
        <Description>CVE-2025-10148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249348</URL>
        <Description>SUSE Bug 1249348</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks.</Note>
    </Notes>
    <CVE>CVE-2025-4947</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container bci/golang:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/golang:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/kiwi:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/kiwi:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container private-registry/harbor-trivy-adapter:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/git:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/sle15:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/sle15:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503198-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-4947.html</URL>
        <Description>CVE-2025-4947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243397</URL>
        <Description>SUSE Bug 1243397</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.</Note>
    </Notes>
    <CVE>CVE-2025-5025</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container bci/golang:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/golang:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/kiwi:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/kiwi:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container private-registry/harbor-trivy-adapter:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/git:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/sle15:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/sle15:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503198-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5025.html</URL>
        <Description>CVE-2025-5025</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243706</URL>
        <Description>SUSE Bug 1243706</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to a mistake in libcurl's WebSocket code, a malicious server can send a
particularly crafted packet which makes libcurl get trapped in an endless
busy-loop.

There is no other way for the application to escape or exit this loop other
than killing the thread/process.

This might be used to DoS libcurl-using application.</Note>
    </Notes>
    <CVE>CVE-2025-5399</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container bci/golang:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/golang:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/kiwi:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/kiwi:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container private-registry/harbor-trivy-adapter:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/git:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/sle15:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/sle15:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503198-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5399.html</URL>
        <Description>CVE-2025-5399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243933</URL>
        <Description>SUSE Bug 1243933</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">1. A cookie is set using the `secure` keyword for `https://target`
2. curl is redirected to or otherwise made to speak with `http://target` (same
   hostname, but using clear text HTTP) using the same cookie set
3. The same cookie name is set - but with just a slash as path (`path='/'`).
   Since this site is not secure, the cookie *should* just be ignored.
4. A bug in the path comparison logic makes curl read outside a heap buffer
   boundary

The bug either causes a crash or it potentially makes the comparison come to
the wrong conclusion and lets the clear-text site override the contents of the
secure cookie, contrary to expectations and depending on the memory contents
immediately following the single-byte allocation that holds the path.

The presumed and correct behavior would be to plainly ignore the second set of
the cookie since it was already set as secure on a secure host so overriding
it on an insecure host should not be okay.</Note>
    </Notes>
    <CVE>CVE-2025-9086</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container bci/golang:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/golang:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/kiwi:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/kiwi:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:0.23:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container bci/spack:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container private-registry/harbor-trivy-adapter:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/git:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/sle15:latest:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>Container suse/sle15:latest:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:curl-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl-devel-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl-devel-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl4-32bit-8.14.1-150600.4.28.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libcurl4-8.14.1-150600.4.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503198-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-9086.html</URL>
        <Description>CVE-2025-9086</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249191</URL>
        <Description>SUSE Bug 1249191</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
