{"affected":[{"ecosystem_specific":{"binaries":[{"curl":"8.6.0-6.1","libcurl4":"8.6.0-6.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"curl","purl":"pkg:rpm/suse/curl&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.6.0-6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for curl fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2025-0725: Fixed gzip integer overflow (bsc#1236590)\n- CVE-2025-0167: Fixed netrc and default credential leak (bsc#1236588)\n\nOther issues fixed:\n\n- Make sure the TLS handshake after a successful STARTTLS command\n  is fully done before further sending/receiving on the connection.  (bsc#1235151)\n","id":"SUSE-SU-2025:20144-1","modified":"2025-03-12T10:47:54Z","published":"2025-03-12T10:47:54Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520144-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235151"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236588"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236590"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-0167"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-0725"}],"related":["CVE-2025-0167","CVE-2025-0725"],"summary":"Security update for curl","upstream":["CVE-2025-0167","CVE-2025-0725"]}