Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/curl@8.18.0-2
purl pkg:deb/debian/curl@8.18.0-2
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (11)
Vulnerability Summary Aliases
VCID-2cx5-1qnw-uufj curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication CVE-2026-1965
VCID-5xp7-mcsa-uqd4 When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the user's wishes and expectations. This could make libcurl find and accept a trust chain that it otherwise would not. CVE-2025-14819
VCID-8zks-th64-33b8 curl: curl: Unauthorized access due to improper HTTP proxy connection reuse CVE-2026-3784
VCID-amgy-dw6h-6ydf curl: curl: Arbitrary code execution or Denial of Service via use-after-free in SMB request handling CVE-2026-3805
VCID-etzn-uhck-h7b2 curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect CVE-2026-3783
VCID-kt4b-7ffh-4bch When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certificate to verify the peer. This check was skipped in a certain condition that would then make curl allow the connection without performing the proper check, thus not noticing a possible impostor. To skip this check, the connection had to be done with QUIC with ngtcp2 built to use GnuTLS and the user had to explicitly disable the standard certificate verification. CVE-2025-13034
VCID-mkyr-w79c-qqfz curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers CVE-2025-14017
VCID-nvzd-v3bs-6qek When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file. CVE-2025-15079
VCID-qpux-jh6k-8qhx curl: Curl missing SFTP host verification with wolfSSH backend CVE-2025-10966
VCID-vbbv-k1r7-kkas When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent. CVE-2025-15224
VCID-x57x-w8g8-7ybz When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host. CVE-2025-14524

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:13:26.051410+00:00 Debian Importer Fixing VCID-5xp7-mcsa-uqd4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:00:11.200918+00:00 Debian Importer Fixing VCID-2cx5-1qnw-uufj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:45:48.348176+00:00 Debian Importer Fixing VCID-qpux-jh6k-8qhx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:33:51.073755+00:00 Debian Importer Fixing VCID-etzn-uhck-h7b2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:26:41.829003+00:00 Debian Importer Fixing VCID-nvzd-v3bs-6qek https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:03:54.891993+00:00 Debian Importer Fixing VCID-kt4b-7ffh-4bch https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:54.876499+00:00 Debian Importer Fixing VCID-mkyr-w79c-qqfz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:05.721111+00:00 Debian Importer Fixing VCID-amgy-dw6h-6ydf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:08.928837+00:00 Debian Importer Fixing VCID-vbbv-k1r7-kkas https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:40.174832+00:00 Debian Importer Fixing VCID-x57x-w8g8-7ybz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:40.728602+00:00 Debian Importer Fixing VCID-8zks-th64-33b8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:21:43.860581+00:00 Debian Importer Fixing VCID-5xp7-mcsa-uqd4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:11:49.988539+00:00 Debian Importer Fixing VCID-2cx5-1qnw-uufj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:16:48.176782+00:00 Debian Importer Fixing VCID-qpux-jh6k-8qhx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:08:06.037615+00:00 Debian Importer Fixing VCID-etzn-uhck-h7b2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:02:45.655490+00:00 Debian Importer Fixing VCID-nvzd-v3bs-6qek https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:09.140521+00:00 Debian Importer Fixing VCID-kt4b-7ffh-4bch https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:29:41.335662+00:00 Debian Importer Fixing VCID-mkyr-w79c-qqfz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:10.764440+00:00 Debian Importer Fixing VCID-amgy-dw6h-6ydf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:33.644351+00:00 Debian Importer Fixing VCID-vbbv-k1r7-kkas https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:20.375220+00:00 Debian Importer Fixing VCID-x57x-w8g8-7ybz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:30.224253+00:00 Debian Importer Fixing VCID-8zks-th64-33b8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-08T19:33:51.166146+00:00 Debian Importer Fixing VCID-5xp7-mcsa-uqd4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:27:30.136336+00:00 Debian Importer Fixing VCID-2cx5-1qnw-uufj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:50:21.321772+00:00 Debian Importer Fixing VCID-qpux-jh6k-8qhx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:44:26.973305+00:00 Debian Importer Fixing VCID-etzn-uhck-h7b2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:40:54.239831+00:00 Debian Importer Fixing VCID-nvzd-v3bs-6qek https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:29:22.380589+00:00 Debian Importer Fixing VCID-kt4b-7ffh-4bch https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:18:51.118818+00:00 Debian Importer Fixing VCID-mkyr-w79c-qqfz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:15:16.431229+00:00 Debian Importer Fixing VCID-amgy-dw6h-6ydf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:21:45.449132+00:00 Debian Importer Fixing VCID-vbbv-k1r7-kkas https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:14:38.639325+00:00 Debian Importer Fixing VCID-x57x-w8g8-7ybz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T06:03:48.152117+00:00 Debian Importer Fixing VCID-8zks-th64-33b8 https://security-tracker.debian.org/tracker/data/json 38.1.0