USN-8062-1 fixed vulnerabilities in curl. This update provides the corresponding update for CVE-2025-14017, CVE-2025-15079, and CVE-2025-15224 for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS.
Original advisory details:
It was discovered that curl incorrectly handled cookies when redirected from secure to insecure connections. An attacker could possibly use this issue to cause a denial of service, or obtain sensitive information. This issue only affected Ubuntu 25.10. (CVE-2025-9086)
Calvin Ruocco discovered that curl did not properly handle WebSocket communications under certain circumstances. A malicious server could possibly use this issue to poison proxy caches with malicious content. This issue only affected Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2025-10148)
Stanislav Fort discovered that wcurl did not properly handle URLs with certain encoded characters. If a user were tricked into processing a specially crafted URL, an attacker could possibly use this issue to write files outside the intended directory. This issue only affected Ubuntu 25.10. (CVE-2025-11563)
Stanislav Fort discovered that curl did not properly validate pinned public keys under certain circumstances. A remote attacker could possibly use this issue to perform a machine-in-the-middle attack. This issue only affected Ubuntu 25.10.(CVE-2025-13034)
Stanislav Fort discovered that curl did not properly manage TLS options when performing LDAP over TLS transfers in multi-threaded environments. Under certain circumstances, certificate verification could be unintentionally and unknowingly disabled. (CVE-2025-14017)
It was discovered that curl incorrectly handled Oauth2 bearer tokens when following redirects. A remote attacker could possibly use this issue to obtain authentication credentials. (CVE-2025-14524)
Stanislav Fort discovered that curl did not properly validate TLS certificates when reusing connections. A remote attacker could possibly use this issue to bypass expected certificate verification. This issue only affected Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2025-14819)
Harry Sintonen discovered that curl did not properly validate SSH host keys when performing SSH-based file transfers. This issue could lead to unintended bypass of custom known_hosts file. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2025-15079)
Harry Sintonen discovered that curl built with libssh did not properly handle authentication when performing SSH-based file transfers. This could result in unintended authentication operations. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2025-15224)
{
"binaries": [
{
"binary_version": "7.35.0-1ubuntu2.20+esm19",
"binary_name": "curl"
},
{
"binary_version": "7.35.0-1ubuntu2.20+esm19",
"binary_name": "libcurl3"
},
{
"binary_version": "7.35.0-1ubuntu2.20+esm19",
"binary_name": "libcurl3-gnutls"
},
{
"binary_version": "7.35.0-1ubuntu2.20+esm19",
"binary_name": "libcurl3-nss"
},
{
"binary_version": "7.35.0-1ubuntu2.20+esm19",
"binary_name": "libcurl4-gnutls-dev"
},
{
"binary_version": "7.35.0-1ubuntu2.20+esm19",
"binary_name": "libcurl4-nss-dev"
},
{
"binary_version": "7.35.0-1ubuntu2.20+esm19",
"binary_name": "libcurl4-openssl-dev"
}
],
"availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro"
}
{
"ecosystem": "Ubuntu:Pro:14.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2025-14017"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8062-2.json"
{
"binaries": [
{
"binary_version": "7.47.0-1ubuntu2.19+esm15",
"binary_name": "curl"
},
{
"binary_version": "7.47.0-1ubuntu2.19+esm15",
"binary_name": "libcurl3"
},
{
"binary_version": "7.47.0-1ubuntu2.19+esm15",
"binary_name": "libcurl3-gnutls"
},
{
"binary_version": "7.47.0-1ubuntu2.19+esm15",
"binary_name": "libcurl3-nss"
},
{
"binary_version": "7.47.0-1ubuntu2.19+esm15",
"binary_name": "libcurl4-gnutls-dev"
},
{
"binary_version": "7.47.0-1ubuntu2.19+esm15",
"binary_name": "libcurl4-nss-dev"
},
{
"binary_version": "7.47.0-1ubuntu2.19+esm15",
"binary_name": "libcurl4-openssl-dev"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"ecosystem": "Ubuntu:Pro:16.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2025-14017"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8062-2.json"
{
"binaries": [
{
"binary_version": "7.58.0-2ubuntu3.24+esm7",
"binary_name": "curl"
},
{
"binary_version": "7.58.0-2ubuntu3.24+esm7",
"binary_name": "libcurl3-gnutls"
},
{
"binary_version": "7.58.0-2ubuntu3.24+esm7",
"binary_name": "libcurl3-nss"
},
{
"binary_version": "7.58.0-2ubuntu3.24+esm7",
"binary_name": "libcurl4"
},
{
"binary_version": "7.58.0-2ubuntu3.24+esm7",
"binary_name": "libcurl4-gnutls-dev"
},
{
"binary_version": "7.58.0-2ubuntu3.24+esm7",
"binary_name": "libcurl4-nss-dev"
},
{
"binary_version": "7.58.0-2ubuntu3.24+esm7",
"binary_name": "libcurl4-openssl-dev"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"ecosystem": "Ubuntu:Pro:18.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2025-14017"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "low",
"type": "Ubuntu"
}
],
"id": "CVE-2025-15079"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
},
{
"score": "low",
"type": "Ubuntu"
}
],
"id": "CVE-2025-15224"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8062-2.json"
{
"binaries": [
{
"binary_version": "7.68.0-1ubuntu2.25+esm2",
"binary_name": "curl"
},
{
"binary_version": "7.68.0-1ubuntu2.25+esm2",
"binary_name": "libcurl3-gnutls"
},
{
"binary_version": "7.68.0-1ubuntu2.25+esm2",
"binary_name": "libcurl3-nss"
},
{
"binary_version": "7.68.0-1ubuntu2.25+esm2",
"binary_name": "libcurl4"
},
{
"binary_version": "7.68.0-1ubuntu2.25+esm2",
"binary_name": "libcurl4-gnutls-dev"
},
{
"binary_version": "7.68.0-1ubuntu2.25+esm2",
"binary_name": "libcurl4-nss-dev"
},
{
"binary_version": "7.68.0-1ubuntu2.25+esm2",
"binary_name": "libcurl4-openssl-dev"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"ecosystem": "Ubuntu:Pro:20.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2025-14017"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "low",
"type": "Ubuntu"
}
],
"id": "CVE-2025-15079"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
},
{
"score": "low",
"type": "Ubuntu"
}
],
"id": "CVE-2025-15224"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8062-2.json"