<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for curl</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2026:0903-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-03-17T10:04:47Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-03-17T10:04:47Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-03-17T10:04:47Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for curl</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for curl fixes the following issues:

- CVE-2026-1965: bad reuse of HTTP Negotiate connection (bsc#1259362).
- CVE-2026-3783: token leak with redirect and netrc (bsc#1259363).
- CVE-2026-3784: wrong proxy connection reuse with credentials (bsc#1259364).
- CVE-2026-3805: use after free in SMB connection reuse (bsc#1259365).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container private-registry/harbor-trivy-adapter:latest-2026-903,Image pr_15_7-2026-903,SUSE-2026-903,SUSE-SLE-Module-Basesystem-15-SP7-2026-903</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260903-1/</URL>
      <Description>Link for SUSE-SU-2026:0903-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2026-March/024702.html</URL>
      <Description>E-Mail link for SUSE-SU-2026:0903-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1259362</URL>
      <Description>SUSE Bug 1259362</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1259363</URL>
      <Description>SUSE Bug 1259363</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1259364</URL>
      <Description>SUSE Bug 1259364</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1259365</URL>
      <Description>SUSE Bug 1259365</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-1965/</URL>
      <Description>SUSE CVE CVE-2026-1965 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-3783/</URL>
      <Description>SUSE CVE CVE-2026-3783 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-3784/</URL>
      <Description>SUSE CVE CVE-2026-3784 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-3805/</URL>
      <Description>SUSE CVE CVE-2026-3805 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container private-registry/harbor-trivy-adapter:latest">
      <Branch Type="Product Name" Name="Container private-registry/harbor-trivy-adapter:latest">
        <FullProductName ProductID="Container private-registry/harbor-trivy-adapter:latest">Container private-registry/harbor-trivy-adapter:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image pr_15_7">
      <Branch Type="Product Name" Name="Image pr_15_7">
        <FullProductName ProductID="Image pr_15_7">Image pr_15_7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP7">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7" CPE="cpe:/o:suse:sle-module-basesystem:15:sp7">SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-8.14.1-150700.7.14.1">
      <FullProductName ProductID="libcurl4-8.14.1-150700.7.14.1">libcurl4-8.14.1-150700.7.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="curl-8.14.1-150700.7.14.1">
      <FullProductName ProductID="curl-8.14.1-150700.7.14.1">curl-8.14.1-150700.7.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="curl-fish-completion-8.14.1-150700.7.14.1">
      <FullProductName ProductID="curl-fish-completion-8.14.1-150700.7.14.1">curl-fish-completion-8.14.1-150700.7.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="curl-zsh-completion-8.14.1-150700.7.14.1">
      <FullProductName ProductID="curl-zsh-completion-8.14.1-150700.7.14.1">curl-zsh-completion-8.14.1-150700.7.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-8.14.1-150700.7.14.1">
      <FullProductName ProductID="libcurl-devel-8.14.1-150700.7.14.1">libcurl-devel-8.14.1-150700.7.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-32bit-8.14.1-150700.7.14.1">
      <FullProductName ProductID="libcurl-devel-32bit-8.14.1-150700.7.14.1">libcurl-devel-32bit-8.14.1-150700.7.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-64bit-8.14.1-150700.7.14.1">
      <FullProductName ProductID="libcurl-devel-64bit-8.14.1-150700.7.14.1">libcurl-devel-64bit-8.14.1-150700.7.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-doc-8.14.1-150700.7.14.1">
      <FullProductName ProductID="libcurl-devel-doc-8.14.1-150700.7.14.1">libcurl-devel-doc-8.14.1-150700.7.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-mini4-8.14.1-150700.7.14.1">
      <FullProductName ProductID="libcurl-mini4-8.14.1-150700.7.14.1">libcurl-mini4-8.14.1-150700.7.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-32bit-8.14.1-150700.7.14.1">
      <FullProductName ProductID="libcurl4-32bit-8.14.1-150700.7.14.1">libcurl4-32bit-8.14.1-150700.7.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-64bit-8.14.1-150700.7.14.1">
      <FullProductName ProductID="libcurl4-64bit-8.14.1-150700.7.14.1">libcurl4-64bit-8.14.1-150700.7.14.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libcurl4-8.14.1-150700.7.14.1" RelationType="Default Component Of" RelatesToProductReference="Container private-registry/harbor-trivy-adapter:latest">
      <FullProductName ProductID="Container private-registry/harbor-trivy-adapter:latest:libcurl4-8.14.1-150700.7.14.1">libcurl4-8.14.1-150700.7.14.1 as a component of Container private-registry/harbor-trivy-adapter:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-8.14.1-150700.7.14.1" RelationType="Default Component Of" RelatesToProductReference="Image pr_15_7">
      <FullProductName ProductID="Image pr_15_7:libcurl4-8.14.1-150700.7.14.1">libcurl4-8.14.1-150700.7.14.1 as a component of Image pr_15_7</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-8.14.1-150700.7.14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.14.1">curl-8.14.1-150700.7.14.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-8.14.1-150700.7.14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.14.1">libcurl-devel-8.14.1-150700.7.14.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-8.14.1-150700.7.14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.14.1">libcurl4-8.14.1-150700.7.14.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-32bit-8.14.1-150700.7.14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.14.1">libcurl4-32bit-8.14.1-150700.7.14.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP7</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libcurl can in some circumstances reuse the wrong connection when asked to do
an Negotiate-authenticated HTTP or HTTPS request.

libcurl features a pool of recent connections so that subsequent requests can
reuse an existing connection to avoid overhead.

When reusing a connection a range of criterion must first be met. Due to a
logical error in the code, a request that was issued by an application could
wrongfully reuse an existing connection to the same server that was
authenticated using different credentials. One underlying reason being that
Negotiate sometimes authenticates *connections* and not *requests*, contrary
to how HTTP is designed to work.

An application that allows Negotiate authentication to a server (that responds
wanting Negotiate) with `user1:password1` and then does another operation to
the same server also using Negotiate but with `user2:password2` (while the
previous connection is still alive) - the second request wrongly reused the
same connection and since it then sees that the Negotiate negotiation is
already made, it just sends the request over that connection thinking it uses
the user2 credentials when it is in fact still using the connection
authenticated for user1...

The set of authentication methods to use is set with  `CURLOPT_HTTPAUTH`.

Applications can disable libcurl's reuse of connections and thus mitigate this
problem, by using one of the following libcurl options to alter how
connections are or are not reused: `CURLOPT_FRESH_CONNECT`,
`CURLOPT_MAXCONNECTS` and `CURLMOPT_MAX_HOST_CONNECTIONS` (if using the
curl_multi API).</Note>
    </Notes>
    <CVE>CVE-2026-1965</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container private-registry/harbor-trivy-adapter:latest:libcurl4-8.14.1-150700.7.14.1</ProductID>
        <ProductID>Image pr_15_7:libcurl4-8.14.1-150700.7.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260903-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-1965.html</URL>
        <Description>CVE-2026-1965</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259362</URL>
        <Description>SUSE Bug 1259362</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer
performs a redirect to a second URL, curl could leak that token to the second
hostname under some circumstances.

If the hostname that the first request is redirected to has information in the
used .netrc file, with either of the `machine` or `default` keywords, curl
would pass on the bearer token set for the first host also to the second one.</Note>
    </Notes>
    <CVE>CVE-2026-3783</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container private-registry/harbor-trivy-adapter:latest:libcurl4-8.14.1-150700.7.14.1</ProductID>
        <ProductID>Image pr_15_7:libcurl4-8.14.1-150700.7.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260903-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-3783.html</URL>
        <Description>CVE-2026-3783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259363</URL>
        <Description>SUSE Bug 1259363</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a
server, even if the new request uses different credentials for the HTTP proxy.
The proper behavior is to create or use a separate connection.</Note>
    </Notes>
    <CVE>CVE-2026-3784</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container private-registry/harbor-trivy-adapter:latest:libcurl4-8.14.1-150700.7.14.1</ProductID>
        <ProductID>Image pr_15_7:libcurl4-8.14.1-150700.7.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260903-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-3784.html</URL>
        <Description>CVE-2026-3784</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259364</URL>
        <Description>SUSE Bug 1259364</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When doing a second SMB request to the same host again, curl would wrongly use
a data pointer pointing into already freed memory.</Note>
    </Notes>
    <CVE>CVE-2026-3805</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container private-registry/harbor-trivy-adapter:latest:libcurl4-8.14.1-150700.7.14.1</ProductID>
        <ProductID>Image pr_15_7:libcurl4-8.14.1-150700.7.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:curl-8.14.1-150700.7.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl-devel-8.14.1-150700.7.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-32bit-8.14.1-150700.7.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP7:libcurl4-8.14.1-150700.7.14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260903-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-3805.html</URL>
        <Description>CVE-2026-3805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259365</URL>
        <Description>SUSE Bug 1259365</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
