Search for packages
Package details: pkg:deb/debian/curl@7.88.1-10%2Bdeb12u7
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u7
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (12)
Vulnerability Summary Aliases
VCID-12hn-k727-m7f7 When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk. CVE-2021-22922
VCID-1ypr-54n1-27hn When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate. CVE-2024-8096
VCID-34ez-spe9-9ugr When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened. CVE-2021-22923
VCID-4v1u-pgym-eubh A cleartext transmission of sensitive information vulnerability exists in curl <v7.88.0 that could cause HSTS functionality fail when multiple URLs are requested serially. Using its HSTS support, curl can be instructed to use HTTPS instead of usingan insecure clear-text HTTP step even when HTTP is provided in the URL. ThisHSTS mechanism would however surprisingly be ignored by subsequent transferswhen done on the same command line because the state would not be properlycarried on. CVE-2023-23914
VCID-dw2d-6fkr-87g2 A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using `alarm()` and `siglongjmp()`. When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave. CVE-2023-28320
VCID-f7g4-7gzn-gfhm A cleartext transmission of sensitive information vulnerability exists in curl <v7.88.0 that could cause HSTS functionality to behave incorrectly when multiple URLs are requested in parallel. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however surprisingly fail when multiple transfers are done in parallel as the HSTS cache file gets overwritten by the most recentlycompleted transfer. A later HTTP-only transfer to the earlier host name would then *not* get upgraded properly to HSTS. CVE-2023-23915
VCID-hh2k-8ecc-9uc5 In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26. CVE-2022-42916
VCID-k66x-9gtj-j7bp When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than otherwise intended. This affects curl using applications that enable HSTS and use URLs with the insecure `HTTP://` scheme and perform transfers with hosts like `x.example.com` as well as `example.com` where the first host is a subdomain of the second host. (The HSTS cache either needs to have been populated manually or there needs to have been previous HTTPS accesses done as the cache needs to have entries for the domains involved to trigger this problem.) When `x.example.com` responds with `Strict-Transport-Security:` headers, this bug can make the subdomain's expiry timeout *bleed over* and get set for the parent domain `example.com` in curl's HSTS cache. The result of a triggered bug is that HTTP accesses to `example.com` get converted to HTTPS for a different period of time than what was asked for by the origin server. If `example.com` for example stops supporting HTTPS at its expiry time, curl might then fail to access `http://example.com` until the (wrongly set) timeout expires. This bug can also expire the parent's entry *earlier*, thus making curl inadvertently switch back to insecure HTTP earlier than otherwise intended. CVE-2024-9681
VCID-ntbe-4v75-c3c1 When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use. CVE-2023-46219
VCID-nwkn-k4e4-mudy A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded. CVE-2022-43551
VCID-pzuq-trxq-6yh8 libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems. CVE-2024-2379
VCID-vyre-1jrv-rqea When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option, **using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would make libcurl perform a buffer overflow. CVE-2025-0725

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T18:22:06.722854+00:00 Debian Oval Importer Fixing VCID-1ypr-54n1-27hn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:22:15.598341+00:00 Debian Importer Fixing VCID-vyre-1jrv-rqea https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T13:11:40.390198+00:00 Debian Importer Fixing VCID-k66x-9gtj-j7bp https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T13:08:38.134729+00:00 Debian Importer Fixing VCID-hh2k-8ecc-9uc5 https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T13:07:08.787150+00:00 Debian Importer Fixing VCID-nwkn-k4e4-mudy https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T13:02:57.262869+00:00 Debian Importer Fixing VCID-pzuq-trxq-6yh8 https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:49:08.520585+00:00 Debian Importer Fixing VCID-4v1u-pgym-eubh https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:41:53.384520+00:00 Debian Importer Fixing VCID-34ez-spe9-9ugr https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:40:23.634994+00:00 Debian Importer Fixing VCID-ntbe-4v75-c3c1 https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:32:23.599646+00:00 Debian Importer Fixing VCID-dw2d-6fkr-87g2 https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:19:07.355004+00:00 Debian Importer Fixing VCID-f7g4-7gzn-gfhm https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:16:09.082546+00:00 Debian Importer Fixing VCID-12hn-k727-m7f7 https://security-tracker.debian.org/tracker/data/json 37.0.0