<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2026-0049</id>
    <title>An update for curl is now available for HCE 2.0</title>
    <severity>Moderate</severity>
    <release>HCE 2.0</release>
    <issued date="2026-03-23 23:18:31"/>
    <updated date="2026-03-23 23:18:31"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-14017" id="CVE-2025-14017" title="CVE-2025-14017 Base Score: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-14524" id="CVE-2025-14524" title="CVE-2025-14524 Base Score: 5.3 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-15079" id="CVE-2025-15079" title="CVE-2025-15079 Base Score: 5.3 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-15224" id="CVE-2025-15224" title="CVE-2025-15224 Base Score: 3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl,
changing TLS options in one thread would inadvertently change them globally
and therefore possibly also affect other concurrently setup transfers.

Disabling certificate verification for a specific transfer could
unintentionally disable the feature for other threads as well. (CVE-2025-14017)

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer
performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP,
POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new
target host. (CVE-2025-14524)

When doing SSH-based transfers using either SCP or SFTP, and setting the
known_hosts file, libcurl could still mistakenly accept connecting to hosts
*not present* in the specified file if they were added as recognized in the
libssh *global* known_hosts file. (CVE-2025-15079)

When doing SSH-based transfers using either SCP or SFTP, and asked to do
public key authentication, curl would wrongly still ask and authenticate using
a locally running SSH agent. (CVE-2025-15224)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="curl">
        <name>HCE 2.0</name>
        <package arch="x86_64" name="curl" version="7.79.1" release="2.r37.hce2">
          <filename>curl-7.79.1-2.r37.hce2.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="curl-help" version="7.79.1" release="2.r37.hce2">
          <filename>curl-help-7.79.1-2.r37.hce2.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="libcurl" version="7.79.1" release="2.r37.hce2">
          <filename>libcurl-7.79.1-2.r37.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="libcurl-devel" version="7.79.1" release="2.r37.hce2">
          <filename>libcurl-devel-7.79.1-2.r37.hce2.x86_64.rpm</filename>
        </package>
        <package arch="aarch64" name="curl" version="7.79.1" release="2.r37.hce2">
          <filename>curl-7.79.1-2.r37.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="libcurl" version="7.79.1" release="2.r37.hce2">
          <filename>libcurl-7.79.1-2.r37.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="libcurl-devel" version="7.79.1" release="2.r37.hce2">
          <filename>libcurl-devel-7.79.1-2.r37.hce2.aarch64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
