Security update for curl
Announcement ID: | SUSE-SU-2025:03198-1 |
---|---|
Release Date: | 2025-09-12T12:15:18Z |
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves seven vulnerabilities, contains two features and has two security fixes can now be installed.
Description:
This update for curl fixes the following issues:
Update to version 8.14.1 (jsc#PED-13055, jsc#PED-13056).
Security issues fixed:
- CVE-2025-0665: eventfd double close can cause libcurl to act unreliably (bsc#1236589).
- CVE-2025-4947: QUIC certificate check is skipped with wolfSSL allows for MITM attacks (bsc#1243397).
- CVE-2025-5025: no QUIC certificate pinning with wolfSSL can lead to connections to impostor servers that are not easily noticed (bsc#1243706).
- CVE-2025-5399: bug in websocket code can cause libcurl to get trapped in an endless busy-loop when processing specially crafted packets (bsc#1243933).
- CVE-2024-6874: punycode conversions to/from IDN can leak stack content when libcurl is built to use the macidn IDN backend (bsc#1228260).
- CVE-2025-9086: bug in patch comparison logic when processing cookies can lead to out-of-bounds read in heap buffer (bsc#1249191).
- CVE-2025-10148: predictable websocket mask can lead to proxy cache poisoning by malicious server (bsc#1249348).
Other issues fixed:
- Fix wrong return code when --retry is used (bsc#1249367).
-
tool_operate: fix return code when --retry is used but not triggered [b42776b]
-
Fix the --ftp-pasv option in curl v8.14.1 (bsc#1246197).
-
tool_getparam: fix --ftp-pasv [5f805ee]
-
Fixed with version 8.14.1:
- TLS: add CURLOPT_SSL_SIGNATURE_ALGORITHMS and --sigalgs.
- websocket: add option to disable auto-pong reply.
- huge number of bugfixes.
Please see https://curl.se/ch/ for full changelogs.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.6
zypper in -t patch SUSE-2025-3198=1 openSUSE-SLE-15.6-2025-3198=1
-
Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3198=1
-
Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3198=1
Package List:
-
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
- libcurl-mini4-8.14.1-150600.4.28.1
- libcurl4-debuginfo-8.14.1-150600.4.28.1
- libcurl-devel-8.14.1-150600.4.28.1
- libcurl-mini4-debuginfo-8.14.1-150600.4.28.1
- libcurl4-8.14.1-150600.4.28.1
- curl-mini-debugsource-8.14.1-150600.4.28.1
- curl-8.14.1-150600.4.28.1
- curl-debuginfo-8.14.1-150600.4.28.1
- curl-debugsource-8.14.1-150600.4.28.1
-
openSUSE Leap 15.6 (noarch)
- curl-zsh-completion-8.14.1-150600.4.28.1
- libcurl-devel-doc-8.14.1-150600.4.28.1
- curl-fish-completion-8.14.1-150600.4.28.1
-
openSUSE Leap 15.6 (x86_64)
- libcurl4-32bit-debuginfo-8.14.1-150600.4.28.1
- libcurl-devel-32bit-8.14.1-150600.4.28.1
- libcurl4-32bit-8.14.1-150600.4.28.1
-
openSUSE Leap 15.6 (aarch64_ilp32)
- libcurl4-64bit-debuginfo-8.14.1-150600.4.28.1
- libcurl-devel-64bit-8.14.1-150600.4.28.1
- libcurl4-64bit-8.14.1-150600.4.28.1
-
Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
- libcurl4-debuginfo-8.14.1-150600.4.28.1
- libcurl-devel-8.14.1-150600.4.28.1
- libcurl4-8.14.1-150600.4.28.1
- curl-8.14.1-150600.4.28.1
- curl-debuginfo-8.14.1-150600.4.28.1
- curl-debugsource-8.14.1-150600.4.28.1
-
Basesystem Module 15-SP6 (x86_64)
- libcurl4-32bit-debuginfo-8.14.1-150600.4.28.1
- libcurl4-32bit-8.14.1-150600.4.28.1
-
Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
- libcurl4-debuginfo-8.14.1-150600.4.28.1
- libcurl-devel-8.14.1-150600.4.28.1
- libcurl4-8.14.1-150600.4.28.1
- curl-8.14.1-150600.4.28.1
- curl-debuginfo-8.14.1-150600.4.28.1
- curl-debugsource-8.14.1-150600.4.28.1
-
Basesystem Module 15-SP7 (x86_64)
- libcurl4-32bit-debuginfo-8.14.1-150600.4.28.1
- libcurl4-32bit-8.14.1-150600.4.28.1
References:
- https://www.suse.com/security/cve/CVE-2024-6874.html
- https://www.suse.com/security/cve/CVE-2025-0665.html
- https://www.suse.com/security/cve/CVE-2025-10148.html
- https://www.suse.com/security/cve/CVE-2025-4947.html
- https://www.suse.com/security/cve/CVE-2025-5025.html
- https://www.suse.com/security/cve/CVE-2025-5399.html
- https://www.suse.com/security/cve/CVE-2025-9086.html
- https://bugzilla.suse.com/show_bug.cgi?id=1228260
- https://bugzilla.suse.com/show_bug.cgi?id=1236589
- https://bugzilla.suse.com/show_bug.cgi?id=1243397
- https://bugzilla.suse.com/show_bug.cgi?id=1243706
- https://bugzilla.suse.com/show_bug.cgi?id=1243933
- https://bugzilla.suse.com/show_bug.cgi?id=1246197
- https://bugzilla.suse.com/show_bug.cgi?id=1249191
- https://bugzilla.suse.com/show_bug.cgi?id=1249348
- https://bugzilla.suse.com/show_bug.cgi?id=1249367
- https://jira.suse.com/browse/PED-13055
- https://jira.suse.com/browse/PED-13056