Skip to content

Commit b5f5b05

Browse files
osv-robotgithub-actions[bot]
authored andcommitted
test: update snapshots
1 parent 0a1aae6 commit b5f5b05

2 files changed

Lines changed: 264 additions & 0 deletions

File tree

tools/apitester/__snapshots__/cassette_TestCommand_MoreLockfiles.snap

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -135,6 +135,10 @@
135135
{},
136136
{
137137
"vulns": [
138+
{
139+
"id": "GHSA-7gcm-g887-7qv7",
140+
"modified": "<RFC3339 date with the year 2026>"
141+
},
138142
{
139143
"id": "GHSA-8qvm-5x2c-j2w7",
140144
"modified": "<RFC3339 date with the year 2026>"

tools/apitester/__snapshots__/cassette_single_query.snap

Lines changed: 260 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2186,6 +2186,266 @@
21862186
}
21872187
]
21882188
},
2189+
{
2190+
"id": "CVE-2025-10966",
2191+
"details": "curl's code for managing SSH connections when SFTP was done using the wolfSSH\npowered backend was flawed and missed host verification mechanisms.\n\nThis prevents curl from detecting MITM attackers and more.",
2192+
"aliases": ["CURL-CVE-2025-10966"],
2193+
"modified": "<RFC3339 date with the year 2026>",
2194+
"published": "2025-11-07T08:15:39.617Z",
2195+
"references": [
2196+
{
2197+
"type": "FIX",
2198+
"url": "https://curl.se/docs/CVE-2025-10966.html"
2199+
},
2200+
{
2201+
"type": "ADVISORY",
2202+
"url": "https://curl.se/docs/CVE-2025-10966.json"
2203+
},
2204+
{
2205+
"type": "EVIDENCE",
2206+
"url": "https://hackerone.com/reports/3355218"
2207+
},
2208+
{
2209+
"type": "ARTICLE",
2210+
"url": "http://www.openwall.com/lists/oss-security/2025/11/05/2"
2211+
}
2212+
],
2213+
"affected": [
2214+
{
2215+
"ranges": [
2216+
{
2217+
"type": "GIT",
2218+
"repo": "https://github.com/curl/curl",
2219+
"events": [
2220+
{
2221+
"introduced": "b8d1366852fd0034374c5de1e4968c7a224f77cc"
2222+
},
2223+
{
2224+
"fixed": "400fffa90f30c7a2dc762fa33009d24851bd2016"
2225+
}
2226+
]
2227+
}
2228+
],
2229+
"versions": 53,
2230+
"database_specific": "<Any value>"
2231+
}
2232+
],
2233+
"schema_version": "1.7.3",
2234+
"severity": [
2235+
{
2236+
"type": "CVSS_V3",
2237+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
2238+
}
2239+
]
2240+
},
2241+
{
2242+
"id": "CVE-2025-14524",
2243+
"details": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
2244+
"aliases": ["CURL-CVE-2025-14524"],
2245+
"modified": "<RFC3339 date with the year 2026>",
2246+
"published": "2026-01-08T10:15:46.607Z",
2247+
"related": ["MGASA-2026-0003"],
2248+
"references": [
2249+
{
2250+
"type": "FIX",
2251+
"url": "https://curl.se/docs/CVE-2025-14524.html"
2252+
},
2253+
{
2254+
"type": "ADVISORY",
2255+
"url": "https://curl.se/docs/CVE-2025-14524.json"
2256+
},
2257+
{
2258+
"type": "EVIDENCE",
2259+
"url": "https://hackerone.com/reports/3459417"
2260+
},
2261+
{
2262+
"type": "ARTICLE",
2263+
"url": "http://www.openwall.com/lists/oss-security/2026/01/07/4"
2264+
}
2265+
],
2266+
"affected": [
2267+
{
2268+
"ranges": [
2269+
{
2270+
"type": "GIT",
2271+
"repo": "https://github.com/curl/curl",
2272+
"events": [
2273+
{
2274+
"introduced": "f77e89c5d20db09eaebf378ec036a7e796932810"
2275+
},
2276+
{
2277+
"fixed": "2eebc58c4b8d68c98c8344381a9f6df4cca838fd"
2278+
}
2279+
]
2280+
}
2281+
],
2282+
"versions": 109,
2283+
"database_specific": "<Any value>"
2284+
}
2285+
],
2286+
"schema_version": "1.7.3",
2287+
"severity": [
2288+
{
2289+
"type": "CVSS_V3",
2290+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
2291+
}
2292+
]
2293+
},
2294+
{
2295+
"id": "CVE-2025-14819",
2296+
"details": "When doing TLS related transfers with reused easy or multi handles and\naltering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user's wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
2297+
"aliases": ["CURL-CVE-2025-14819"],
2298+
"modified": "<RFC3339 date with the year 2026>",
2299+
"published": "2026-01-08T10:15:46.730Z",
2300+
"related": ["MGASA-2026-0003"],
2301+
"references": [
2302+
{
2303+
"type": "FIX",
2304+
"url": "https://curl.se/docs/CVE-2025-14819.html"
2305+
},
2306+
{
2307+
"type": "ARTICLE",
2308+
"url": "http://www.openwall.com/lists/oss-security/2026/01/07/5"
2309+
},
2310+
{
2311+
"type": "ADVISORY",
2312+
"url": "https://curl.se/docs/CVE-2025-14819.json"
2313+
}
2314+
],
2315+
"affected": [
2316+
{
2317+
"ranges": [
2318+
{
2319+
"type": "GIT",
2320+
"repo": "https://github.com/curl/curl",
2321+
"events": [
2322+
{
2323+
"introduced": "c12fb3ddaf48e709a7a4deaa55ec485e4df163ee"
2324+
},
2325+
{
2326+
"fixed": "2eebc58c4b8d68c98c8344381a9f6df4cca838fd"
2327+
}
2328+
]
2329+
}
2330+
],
2331+
"versions": 34,
2332+
"database_specific": "<Any value>"
2333+
}
2334+
],
2335+
"schema_version": "1.7.3",
2336+
"severity": [
2337+
{
2338+
"type": "CVSS_V3",
2339+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
2340+
}
2341+
]
2342+
},
2343+
{
2344+
"id": "CVE-2025-15079",
2345+
"details": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
2346+
"aliases": ["CURL-CVE-2025-15079"],
2347+
"modified": "<RFC3339 date with the year 2026>",
2348+
"published": "2026-01-08T10:15:47.100Z",
2349+
"related": ["MGASA-2026-0003"],
2350+
"references": [
2351+
{
2352+
"type": "FIX",
2353+
"url": "https://curl.se/docs/CVE-2025-15079.html"
2354+
},
2355+
{
2356+
"type": "ADVISORY",
2357+
"url": "https://curl.se/docs/CVE-2025-15079.json"
2358+
},
2359+
{
2360+
"type": "EVIDENCE",
2361+
"url": "https://hackerone.com/reports/3477116"
2362+
},
2363+
{
2364+
"type": "ARTICLE",
2365+
"url": "http://www.openwall.com/lists/oss-security/2026/01/07/6"
2366+
}
2367+
],
2368+
"affected": [
2369+
{
2370+
"ranges": [
2371+
{
2372+
"type": "GIT",
2373+
"repo": "https://github.com/curl/curl",
2374+
"events": [
2375+
{
2376+
"introduced": "d6c21c8eec597a925d2b647cff3d58ac69de01a0"
2377+
},
2378+
{
2379+
"fixed": "2eebc58c4b8d68c98c8344381a9f6df4cca838fd"
2380+
}
2381+
]
2382+
}
2383+
],
2384+
"versions": 73,
2385+
"database_specific": "<Any value>"
2386+
}
2387+
],
2388+
"schema_version": "1.7.3",
2389+
"severity": [
2390+
{
2391+
"type": "CVSS_V3",
2392+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
2393+
}
2394+
]
2395+
},
2396+
{
2397+
"id": "CVE-2025-15224",
2398+
"details": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
2399+
"aliases": ["CURL-CVE-2025-15224"],
2400+
"modified": "<RFC3339 date with the year 2026>",
2401+
"published": "2026-01-08T10:15:47.207Z",
2402+
"related": ["MGASA-2026-0003"],
2403+
"references": [
2404+
{
2405+
"type": "FIX",
2406+
"url": "https://curl.se/docs/CVE-2025-15224.html"
2407+
},
2408+
{
2409+
"type": "ADVISORY",
2410+
"url": "https://curl.se/docs/CVE-2025-15224.json"
2411+
},
2412+
{
2413+
"type": "EVIDENCE",
2414+
"url": "https://hackerone.com/reports/3480925"
2415+
},
2416+
{
2417+
"type": "ARTICLE",
2418+
"url": "http://www.openwall.com/lists/oss-security/2026/01/07/7"
2419+
}
2420+
],
2421+
"affected": [
2422+
{
2423+
"ranges": [
2424+
{
2425+
"type": "GIT",
2426+
"repo": "https://github.com/curl/curl",
2427+
"events": [
2428+
{
2429+
"introduced": "d6c21c8eec597a925d2b647cff3d58ac69de01a0"
2430+
},
2431+
{
2432+
"fixed": "2eebc58c4b8d68c98c8344381a9f6df4cca838fd"
2433+
}
2434+
]
2435+
}
2436+
],
2437+
"versions": 73,
2438+
"database_specific": "<Any value>"
2439+
}
2440+
],
2441+
"schema_version": "1.7.3",
2442+
"severity": [
2443+
{
2444+
"type": "CVSS_V3",
2445+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
2446+
}
2447+
]
2448+
},
21892449
{
21902450
"id": "CVE-2025-5025",
21912451
"details": "libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.",

0 commit comments

Comments
 (0)