-
Notifications
You must be signed in to change notification settings - Fork 2.3k
Description
Hi,
Describe the bug
CVE-2025-4947 clearly states that libcurl mistakenly bypasses certificate verification for QUIC connections when a host is specified as an IP address in the URL. It is clear that this system does not detect impostors or man-in-the-middle attacks. (https://curl.se/docs/CVE-2025-4947.html)
The docker image redocly/redoc in version 2.4 uses libcurl version 8.11.1 and is affected by the mentioned vulnerability. It is clear that version 2.5 uses libcurl 8.12.1, which is also affected by the vulnerability.
Expected behavior
Docker image version 2.5 or a new one will be published with an unaffected libcurl library.
Minimal reproducible OpenAPI snippet(if possible)
Screenshots
Additional context
Could you check, and if you can, publish the next version of your Docker image with an unaffected libcurl library?
Thank you!