{
  "document": {
    "aggregate_severity": {
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2024-9681: improve HSTS subdomain handling to prevent incorrectly overriding\n  parent domain entries",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/tuxcare9.6esu/advisories/2026/clsa-2026_1767628458.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767628458",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767628458"
      }
    ],
    "tracking": {
      "current_release_date": "2026-01-05T15:54:58Z",
      "generator": {
        "date": "2026-01-05T15:54:58Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1767628458",
      "initial_release_date": "2026-01-05T15:54:58Z",
      "revision_history": [
        {
          "date": "2026-01-05T15:54:58Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "curl: Fix of CVE-2024-9681"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "AlmaLinux 9.6",
                "product": {
                  "name": "AlmaLinux 9.6",
                  "product_id": "AlmaLinux-9.6",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:almalinux:almalinux:9.6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "AlmaLinux"
          }
        ],
        "category": "vendor",
        "name": "AlmaLinux OS Foundation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Rocky Linux 9.6",
                "product": {
                  "name": "Rocky Linux 9.6",
                  "product_id": "Rocky Linux-9.6",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:resf:rocky_linux:9.6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Rocky Linux"
          }
        ],
        "category": "vendor",
        "name": "Rocky Linux"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
                "product": {
                  "name": "curl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
                  "product_id": "curl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/curl-minimal@7.76.1-31.el9_6.1.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
                "product": {
                  "name": "libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
                  "product_id": "libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libcurl-minimal@7.76.1-31.el9_6.1.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
                "product": {
                  "name": "libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
                  "product_id": "libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libcurl@7.76.1-31.el9_6.1.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
                "product": {
                  "name": "libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
                  "product_id": "libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libcurl-devel@7.76.1-31.el9_6.1.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "curl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
                "product": {
                  "name": "curl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
                  "product_id": "curl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/curl@7.76.1-31.el9_6.1.tuxcare.els2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
                "product": {
                  "name": "libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
                  "product_id": "libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libcurl-minimal@7.76.1-31.el9_6.1.tuxcare.els2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
                "product": {
                  "name": "libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
                  "product_id": "libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libcurl@7.76.1-31.el9_6.1.tuxcare.els2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
                "product": {
                  "name": "libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
                  "product_id": "libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libcurl-devel@7.76.1-31.el9_6.1.tuxcare.els2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:curl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64"
        },
        "product_reference": "curl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.i686 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.i686"
        },
        "product_reference": "libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64"
        },
        "product_reference": "libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.i686 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.i686"
        },
        "product_reference": "libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64"
        },
        "product_reference": "libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.i686 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.i686"
        },
        "product_reference": "libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64"
        },
        "product_reference": "libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:curl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64"
        },
        "product_reference": "curl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:curl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64"
        },
        "product_reference": "curl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.i686 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.i686"
        },
        "product_reference": "libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64"
        },
        "product_reference": "libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.i686 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.i686"
        },
        "product_reference": "libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64"
        },
        "product_reference": "libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.i686 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.i686"
        },
        "product_reference": "libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64"
        },
        "product_reference": "libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:curl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64"
        },
        "product_reference": "curl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-9681",
      "cwe": {
        "id": "CWE-697",
        "name": "Incorrect Comparison"
      },
      "notes": [
        {
          "category": "description",
          "text": "When curl is asked to use HSTS, the expiry time for a subdomain might\noverwrite a parent domain's cache entry, making it end sooner or later than\notherwise intended.\n\nThis affects curl using applications that enable HSTS and use URLs with the\ninsecure `HTTP://` scheme and perform transfers with hosts like\n`x.example.com` as well as `example.com` where the first host is a subdomain\nof the second host.\n\n(The HSTS cache either needs to have been populated manually or there needs to\nhave been previous HTTPS accesses done as the cache needs to have entries for\nthe domains involved to trigger this problem.)\n\nWhen `x.example.com` responds with `Strict-Transport-Security:` headers, this\nbug can make the subdomain's expiry timeout *bleed over* and get set for the\nparent domain `example.com` in curl's HSTS cache.\n\nThe result of a triggered bug is that HTTP accesses to `example.com` get\nconverted to HTTPS for a different period of time than what was asked for by\nthe origin server. If `example.com` for example stops supporting HTTPS at its\nexpiry time, curl might then fail to access `http://example.com` until the\n(wrongly set) timeout expires. This bug can also expire the parent's entry\n*earlier*, thus making curl inadvertently switch back to insecure HTTP earlier\nthan otherwise intended.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:curl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
          "AlmaLinux-9.6:curl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
          "AlmaLinux-9.6:libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
          "AlmaLinux-9.6:libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
          "AlmaLinux-9.6:libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
          "AlmaLinux-9.6:libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
          "AlmaLinux-9.6:libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
          "AlmaLinux-9.6:libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
          "Rocky Linux-9.6:curl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
          "Rocky Linux-9.6:curl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
          "Rocky Linux-9.6:libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
          "Rocky Linux-9.6:libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
          "Rocky Linux-9.6:libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
          "Rocky Linux-9.6:libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
          "Rocky Linux-9.6:libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
          "Rocky Linux-9.6:libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-9681"
        },
        {
          "category": "external",
          "summary": "https://curl.se/docs/CVE-2024-9681.html",
          "url": "https://curl.se/docs/CVE-2024-9681.html"
        },
        {
          "category": "external",
          "summary": "https://curl.se/docs/CVE-2024-9681.json",
          "url": "https://curl.se/docs/CVE-2024-9681.json"
        },
        {
          "category": "external",
          "summary": "https://hackerone.com/reports/2764830",
          "url": "https://hackerone.com/reports/2764830"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2025/Apr/10",
          "url": "http://seclists.org/fulldisclosure/2025/Apr/10"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2025/Apr/11",
          "url": "http://seclists.org/fulldisclosure/2025/Apr/11"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2025/Apr/12",
          "url": "http://seclists.org/fulldisclosure/2025/Apr/12"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2025/Apr/13",
          "url": "http://seclists.org/fulldisclosure/2025/Apr/13"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2025/Apr/4",
          "url": "http://seclists.org/fulldisclosure/2025/Apr/4"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2025/Apr/5",
          "url": "http://seclists.org/fulldisclosure/2025/Apr/5"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2025/Apr/8",
          "url": "http://seclists.org/fulldisclosure/2025/Apr/8"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2025/Apr/9",
          "url": "http://seclists.org/fulldisclosure/2025/Apr/9"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2024/11/06/2",
          "url": "http://www.openwall.com/lists/oss-security/2024/11/06/2"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20241213-0006/",
          "url": "https://security.netapp.com/advisory/ntap-20241213-0006/"
        }
      ],
      "release_date": "2024-11-06T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T15:54:20.525154Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767628458",
          "product_ids": [
            "AlmaLinux-9.6:curl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "AlmaLinux-9.6:curl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "AlmaLinux-9.6:libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
            "AlmaLinux-9.6:libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "AlmaLinux-9.6:libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
            "AlmaLinux-9.6:libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "AlmaLinux-9.6:libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
            "AlmaLinux-9.6:libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "Rocky Linux-9.6:curl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "Rocky Linux-9.6:curl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "Rocky Linux-9.6:libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
            "Rocky Linux-9.6:libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "Rocky Linux-9.6:libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
            "Rocky Linux-9.6:libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "Rocky Linux-9.6:libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
            "Rocky Linux-9.6:libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767628458"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:curl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "AlmaLinux-9.6:curl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "AlmaLinux-9.6:libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
            "AlmaLinux-9.6:libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "AlmaLinux-9.6:libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
            "AlmaLinux-9.6:libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "AlmaLinux-9.6:libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
            "AlmaLinux-9.6:libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "Rocky Linux-9.6:curl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "Rocky Linux-9.6:curl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "Rocky Linux-9.6:libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
            "Rocky Linux-9.6:libcurl-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "Rocky Linux-9.6:libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
            "Rocky Linux-9.6:libcurl-devel-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64",
            "Rocky Linux-9.6:libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.i686",
            "Rocky Linux-9.6:libcurl-minimal-0:7.76.1-31.el9_6.1.tuxcare.els2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    }
  ]
}