Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Welcome to #curl 8.19.0

Welcome to #curl 8.19.0

Scheduled Pinned Locked Moved Uncategorized
curl
11 Posts 4 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • bagder@mastodon.socialB This user is from outside of this forum
    bagder@mastodon.socialB This user is from outside of this forum
    bagder@mastodon.social
    wrote last edited by
    #1

    Welcome to #curl 8.19.0

    Link Preview Image
    curl 8.19.0

    Release presentation https://www.youtube.com/watch?v=5XoJTh99bPg Numbers the 273rd release8 changes63 days (total: 10,712)264 bugfixes (total: 13,640)538 commits (total: 38,024)0 new public libcurl function (total: 100)0 new curl_easy_setopt() option (total: 308)0 new curl command line option (total: 273)77 contributors, 48 new (total: 3,619)37 authors, 21 new (total: 1,451)4 security fixes (total: 180) Security We stopped the bug-bounty but … Continue reading curl 8.19.0 →

    favicon

    daniel.haxx.se (daniel.haxx.se)

    8 changes, 4 vulnerabilities and 264 bugs fixed. Enjoy!

    (The 4 new CVEs are explained in follow-up toots.)

    bagder@mastodon.socialB vsz@mastodon.socialV 3 Replies Last reply
    1
    0
    • bagder@mastodon.socialB bagder@mastodon.social

      Welcome to #curl 8.19.0

      Link Preview Image
      curl 8.19.0

      Release presentation https://www.youtube.com/watch?v=5XoJTh99bPg Numbers the 273rd release8 changes63 days (total: 10,712)264 bugfixes (total: 13,640)538 commits (total: 38,024)0 new public libcurl function (total: 100)0 new curl_easy_setopt() option (total: 308)0 new curl command line option (total: 273)77 contributors, 48 new (total: 3,619)37 authors, 21 new (total: 1,451)4 security fixes (total: 180) Security We stopped the bug-bounty but … Continue reading curl 8.19.0 →

      favicon

      daniel.haxx.se (daniel.haxx.se)

      8 changes, 4 vulnerabilities and 264 bugs fixed. Enjoy!

      (The 4 new CVEs are explained in follow-up toots.)

      bagder@mastodon.socialB This user is from outside of this forum
      bagder@mastodon.socialB This user is from outside of this forum
      bagder@mastodon.social
      wrote last edited by
      #2

      CVE-2026-1965: bad reuse of HTTP Negotiate connection

      libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request.

      Link Preview Image
      curl - bad reuse of HTTP Negotiate connection - CVE-2026-1965

      favicon

      (curl.se)

      bagder@mastodon.socialB 1 Reply Last reply
      0
      • bagder@mastodon.socialB bagder@mastodon.social

        CVE-2026-1965: bad reuse of HTTP Negotiate connection

        libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request.

        Link Preview Image
        curl - bad reuse of HTTP Negotiate connection - CVE-2026-1965

        favicon

        (curl.se)

        bagder@mastodon.socialB This user is from outside of this forum
        bagder@mastodon.socialB This user is from outside of this forum
        bagder@mastodon.social
        wrote last edited by
        #3

        CVE-2026-3783: token leak with redirect and netrc

        When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances.

        bagder@mastodon.socialB 1 Reply Last reply
        0
        • bagder@mastodon.socialB bagder@mastodon.social

          CVE-2026-3783: token leak with redirect and netrc

          When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances.

          bagder@mastodon.socialB This user is from outside of this forum
          bagder@mastodon.socialB This user is from outside of this forum
          bagder@mastodon.social
          wrote last edited by
          #4

          CVE-2026-3784: wrong proxy connection reuse with credentials

          curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.

          Link Preview Image
          curl - wrong proxy connection reuse with credentials - CVE-2026-3784

          favicon

          (curl.se)

          bagder@mastodon.socialB 1 Reply Last reply
          0
          • bagder@mastodon.socialB bagder@mastodon.social

            CVE-2026-3784: wrong proxy connection reuse with credentials

            curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.

            Link Preview Image
            curl - wrong proxy connection reuse with credentials - CVE-2026-3784

            favicon

            (curl.se)

            bagder@mastodon.socialB This user is from outside of this forum
            bagder@mastodon.socialB This user is from outside of this forum
            bagder@mastodon.social
            wrote last edited by
            #5

            CVE-2026-3805: use after free in SMB connection reuse

            When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.

            Link Preview Image
            curl - use after free in SMB connection reuse - CVE-2026-3805

            favicon

            (curl.se)

            bagder@mastodon.socialB 1 Reply Last reply
            0
            • bagder@mastodon.socialB bagder@mastodon.social

              CVE-2026-3805: use after free in SMB connection reuse

              When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.

              Link Preview Image
              curl - use after free in SMB connection reuse - CVE-2026-3805

              favicon

              (curl.se)

              bagder@mastodon.socialB This user is from outside of this forum
              bagder@mastodon.socialB This user is from outside of this forum
              bagder@mastodon.social
              wrote last edited by
              #6

              As always with curl CVEs, no other resource has the level of detail and exactness about the flaws like the documentation provided at curl.se

              amy@sk.girlthi.ngA marekknapek@hachyderm.ioM 2 Replies Last reply
              0
              • bagder@mastodon.socialB bagder@mastodon.social

                As always with curl CVEs, no other resource has the level of detail and exactness about the flaws like the documentation provided at curl.se

                amy@sk.girlthi.ngA This user is from outside of this forum
                amy@sk.girlthi.ngA This user is from outside of this forum
                amy@sk.girlthi.ng
                wrote last edited by
                #7

                @bagder@mastodon.social i’m surprised this is unlikely to cause crashes given you read and process from potential garbage, is there a specific design choice that makes curl/the functions you’re calling here more resilient against reading garbage?

                1 Reply Last reply
                0
                • bagder@mastodon.socialB bagder@mastodon.social

                  Welcome to #curl 8.19.0

                  Link Preview Image
                  curl 8.19.0

                  Release presentation https://www.youtube.com/watch?v=5XoJTh99bPg Numbers the 273rd release8 changes63 days (total: 10,712)264 bugfixes (total: 13,640)538 commits (total: 38,024)0 new public libcurl function (total: 100)0 new curl_easy_setopt() option (total: 308)0 new curl command line option (total: 273)77 contributors, 48 new (total: 3,619)37 authors, 21 new (total: 1,451)4 security fixes (total: 180) Security We stopped the bug-bounty but … Continue reading curl 8.19.0 →

                  favicon

                  daniel.haxx.se (daniel.haxx.se)

                  8 changes, 4 vulnerabilities and 264 bugs fixed. Enjoy!

                  (The 4 new CVEs are explained in follow-up toots.)

                  bagder@mastodon.socialB This user is from outside of this forum
                  bagder@mastodon.socialB This user is from outside of this forum
                  bagder@mastodon.social
                  wrote last edited by
                  #8

                  The live-streamed video presentation about this #curl release starts in less than two hours at https://www.twitch.tv/curlhacker

                  1 Reply Last reply
                  0
                  • bagder@mastodon.socialB bagder@mastodon.social

                    Welcome to #curl 8.19.0

                    Link Preview Image
                    curl 8.19.0

                    Release presentation https://www.youtube.com/watch?v=5XoJTh99bPg Numbers the 273rd release8 changes63 days (total: 10,712)264 bugfixes (total: 13,640)538 commits (total: 38,024)0 new public libcurl function (total: 100)0 new curl_easy_setopt() option (total: 308)0 new curl command line option (total: 273)77 contributors, 48 new (total: 3,619)37 authors, 21 new (total: 1,451)4 security fixes (total: 180) Security We stopped the bug-bounty but … Continue reading curl 8.19.0 →

                    favicon

                    daniel.haxx.se (daniel.haxx.se)

                    8 changes, 4 vulnerabilities and 264 bugs fixed. Enjoy!

                    (The 4 new CVEs are explained in follow-up toots.)

                    vsz@mastodon.socialV This user is from outside of this forum
                    vsz@mastodon.socialV This user is from outside of this forum
                    vsz@mastodon.social
                    wrote last edited by
                    #9

                    @bagder #curl 8.19.0 Windows builds at https://curl.se/windows/ via https://github.com/curl/curl-for-win/commit/b64e9da1f0a39c4a4a43ec8c316c94d815db83ff

                    1 Reply Last reply
                    0
                    • bagder@mastodon.socialB bagder@mastodon.social

                      As always with curl CVEs, no other resource has the level of detail and exactness about the flaws like the documentation provided at curl.se

                      marekknapek@hachyderm.ioM This user is from outside of this forum
                      marekknapek@hachyderm.ioM This user is from outside of this forum
                      marekknapek@hachyderm.io
                      wrote last edited by
                      #10

                      @bagder Hi Daniel, are you the one who is deciding whether some bug in curl is a CVE or not? As we all know CVE is "just" some other guy's database. And you and your project had a lot of trouble being bombarded by nonsense CVEs in the past.

                      So, I want to ask: Has the situation improved since then? Are you the authority over curl CVE now?

                      bagder@mastodon.socialB 1 Reply Last reply
                      0
                      • marekknapek@hachyderm.ioM marekknapek@hachyderm.io

                        @bagder Hi Daniel, are you the one who is deciding whether some bug in curl is a CVE or not? As we all know CVE is "just" some other guy's database. And you and your project had a lot of trouble being bombarded by nonsense CVEs in the past.

                        So, I want to ask: Has the situation improved since then? Are you the authority over curl CVE now?

                        bagder@mastodon.socialB This user is from outside of this forum
                        bagder@mastodon.socialB This user is from outside of this forum
                        bagder@mastodon.social
                        wrote last edited by
                        #11

                        @MarekKnapek yes, we are a "CNA" since a while back, which means that we now decide ourselves if a curl flaw is a CVE or not. This has really improved the situation.

                        1 Reply Last reply
                        0
                        • R relay@relay.an.exchange shared this topic
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups