{"affected":[{"ecosystem_specific":{"binaries":[{"curl":"8.6.0-3.1","libcurl4":"8.6.0-3.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"curl","purl":"pkg:rpm/suse/curl&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.6.0-3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for curl fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2024-7264: ASN.1 date parser overread (bsc#1228535)\n- CVE-2024-6197: Freeing stack buffer in utf8asn1str (bsc#1227888)\n- CVE-2024-2379: QUIC certificate check bypass with wolfSSL (bsc#1221666)\n- CVE-2024-2466: TLS certificate check bypass with mbedTLS (bsc#1221668)\n- CVE-2024-2004: Usage of disabled protocol (bsc#1221665)\n- CVE-2024-2398: HTTP/2 push headers memory-leak (bsc#1221667)\n\nNon-security issue fixed:\n\n- Fixed various TLS related issues including FTP over SSL transmission timeouts.\n","id":"SUSE-SU-2025:20029-1","modified":"2025-02-03T08:51:25Z","published":"2025-02-03T08:51:25Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520029-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221665"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221666"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221667"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221668"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227888"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228535"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-2004"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-2379"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-2398"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-2466"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-6197"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7264"}],"related":["CVE-2024-2004","CVE-2024-2379","CVE-2024-2398","CVE-2024-2466","CVE-2024-6197","CVE-2024-7264"],"summary":"Security update for curl","upstream":["CVE-2024-2004","CVE-2024-2379","CVE-2024-2398","CVE-2024-2466","CVE-2024-6197","CVE-2024-7264"]}