Out-of-bounds Read Affecting curl-minimal package, versions <0:7.76.1-14.el9_0.12


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.1% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL9-CURLMINIMAL-14402354
  • published12 Dec 2025
  • disclosed12 Sept 2025

Introduced: 12 Sep 2025

CVE-2025-9086  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

Upgrade RHEL:9 curl-minimal to version 0:7.76.1-14.el9_0.12 or higher.
This issue was patched in RHSA-2025:23126.

NVD Description

Note: Versions mentioned in the description apply only to the upstream curl-minimal package and not the curl-minimal package as distributed by RHEL. See How to fix? for RHEL:9 relevant fixed versions and status.

  1. A cookie is set using the secure keyword for https://target
  2. curl is redirected to or otherwise made to speak with http://target (same hostname, but using clear text HTTP) using the same cookie set
  3. The same cookie name is set - but with just a slash as path (path=&#39;/&#39;). Since this site is not secure, the cookie should just be ignored.
  4. A bug in the path comparison logic makes curl read outside a heap buffer boundary

The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.

The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.

CVSS Base Scores

version 3.1