Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Welcome to #curl 8.19.0

Welcome to #curl 8.19.0

Scheduled Pinned Locked Moved Uncategorized
curl
11 Posts 4 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • bagder@mastodon.socialB bagder@mastodon.social

    Welcome to #curl 8.19.0

    https://daniel.haxx.se/blog/2026/03/11/curl-8-19-0/

    8 changes, 4 vulnerabilities and 264 bugs fixed. Enjoy!

    (The 4 new CVEs are explained in follow-up toots.)

    bagder@mastodon.socialB This user is from outside of this forum
    bagder@mastodon.socialB This user is from outside of this forum
    bagder@mastodon.social
    wrote last edited by
    #2

    CVE-2026-1965: bad reuse of HTTP Negotiate connection

    libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request.

    https://curl.se/docs/CVE-2026-1965.html

    bagder@mastodon.socialB 1 Reply Last reply
    0
    • bagder@mastodon.socialB bagder@mastodon.social

      CVE-2026-1965: bad reuse of HTTP Negotiate connection

      libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request.

      https://curl.se/docs/CVE-2026-1965.html

      bagder@mastodon.socialB This user is from outside of this forum
      bagder@mastodon.socialB This user is from outside of this forum
      bagder@mastodon.social
      wrote last edited by
      #3

      CVE-2026-3783: token leak with redirect and netrc

      When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances.

      bagder@mastodon.socialB 1 Reply Last reply
      0
      • bagder@mastodon.socialB bagder@mastodon.social

        CVE-2026-3783: token leak with redirect and netrc

        When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances.

        bagder@mastodon.socialB This user is from outside of this forum
        bagder@mastodon.socialB This user is from outside of this forum
        bagder@mastodon.social
        wrote last edited by
        #4

        CVE-2026-3784: wrong proxy connection reuse with credentials

        curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.

        https://curl.se/docs/CVE-2026-3784.html

        bagder@mastodon.socialB 1 Reply Last reply
        0
        • bagder@mastodon.socialB bagder@mastodon.social

          CVE-2026-3784: wrong proxy connection reuse with credentials

          curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.

          https://curl.se/docs/CVE-2026-3784.html

          bagder@mastodon.socialB This user is from outside of this forum
          bagder@mastodon.socialB This user is from outside of this forum
          bagder@mastodon.social
          wrote last edited by
          #5

          CVE-2026-3805: use after free in SMB connection reuse

          When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.

          https://curl.se/docs/CVE-2026-3805.html

          bagder@mastodon.socialB 1 Reply Last reply
          0
          • bagder@mastodon.socialB bagder@mastodon.social

            CVE-2026-3805: use after free in SMB connection reuse

            When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.

            https://curl.se/docs/CVE-2026-3805.html

            bagder@mastodon.socialB This user is from outside of this forum
            bagder@mastodon.socialB This user is from outside of this forum
            bagder@mastodon.social
            wrote last edited by
            #6

            As always with curl CVEs, no other resource has the level of detail and exactness about the flaws like the documentation provided at curl.se

            amy@sk.girlthi.ngA marekknapek@hachyderm.ioM 2 Replies Last reply
            0
            • bagder@mastodon.socialB bagder@mastodon.social

              As always with curl CVEs, no other resource has the level of detail and exactness about the flaws like the documentation provided at curl.se

              amy@sk.girlthi.ngA This user is from outside of this forum
              amy@sk.girlthi.ngA This user is from outside of this forum
              amy@sk.girlthi.ng
              wrote last edited by
              #7

              @bagder@mastodon.social i’m surprised this is unlikely to cause crashes given you read and process from potential garbage, is there a specific design choice that makes curl/the functions you’re calling here more resilient against reading garbage?

              1 Reply Last reply
              0
              • bagder@mastodon.socialB bagder@mastodon.social

                Welcome to #curl 8.19.0

                https://daniel.haxx.se/blog/2026/03/11/curl-8-19-0/

                8 changes, 4 vulnerabilities and 264 bugs fixed. Enjoy!

                (The 4 new CVEs are explained in follow-up toots.)

                bagder@mastodon.socialB This user is from outside of this forum
                bagder@mastodon.socialB This user is from outside of this forum
                bagder@mastodon.social
                wrote last edited by
                #8

                The live-streamed video presentation about this #curl release starts in less than two hours at https://www.twitch.tv/curlhacker

                1 Reply Last reply
                0
                • bagder@mastodon.socialB bagder@mastodon.social

                  Welcome to #curl 8.19.0

                  https://daniel.haxx.se/blog/2026/03/11/curl-8-19-0/

                  8 changes, 4 vulnerabilities and 264 bugs fixed. Enjoy!

                  (The 4 new CVEs are explained in follow-up toots.)

                  vsz@mastodon.socialV This user is from outside of this forum
                  vsz@mastodon.socialV This user is from outside of this forum
                  vsz@mastodon.social
                  wrote last edited by
                  #9

                  @bagder #curl 8.19.0 Windows builds at https://curl.se/windows/ via https://github.com/curl/curl-for-win/commit/b64e9da1f0a39c4a4a43ec8c316c94d815db83ff

                  1 Reply Last reply
                  0
                  • bagder@mastodon.socialB bagder@mastodon.social

                    As always with curl CVEs, no other resource has the level of detail and exactness about the flaws like the documentation provided at curl.se

                    marekknapek@hachyderm.ioM This user is from outside of this forum
                    marekknapek@hachyderm.ioM This user is from outside of this forum
                    marekknapek@hachyderm.io
                    wrote last edited by
                    #10

                    @bagder Hi Daniel, are you the one who is deciding whether some bug in curl is a CVE or not? As we all know CVE is "just" some other guy's database. And you and your project had a lot of trouble being bombarded by nonsense CVEs in the past.

                    So, I want to ask: Has the situation improved since then? Are you the authority over curl CVE now?

                    bagder@mastodon.socialB 1 Reply Last reply
                    0
                    • marekknapek@hachyderm.ioM marekknapek@hachyderm.io

                      @bagder Hi Daniel, are you the one who is deciding whether some bug in curl is a CVE or not? As we all know CVE is "just" some other guy's database. And you and your project had a lot of trouble being bombarded by nonsense CVEs in the past.

                      So, I want to ask: Has the situation improved since then? Are you the authority over curl CVE now?

                      bagder@mastodon.socialB This user is from outside of this forum
                      bagder@mastodon.socialB This user is from outside of this forum
                      bagder@mastodon.social
                      wrote last edited by
                      #11

                      @MarekKnapek yes, we are a "CNA" since a while back, which means that we now decide ourselves if a curl flaw is a CVE or not. This has really improved the situation.

                      1 Reply Last reply
                      0
                      • R relay@relay.an.exchange shared this topic
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups