Search CVE reports
1 – 10 of 158 results
CVE-2024-9681
Low priorityWhen curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than otherwise intended. This affects curl using applications that enable HSTS and use...
1 affected packages
curl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
curl | Vulnerable | Vulnerable | Not affected | Not affected | Not affected |
CVE-2024-8096
Medium prioritySome fixes available 4 of 7
When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the...
1 affected packages
curl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
curl | Fixed | Fixed | Fixed | Needs evaluation | Needs evaluation |
CVE-2024-7264
Medium prioritylibcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*,...
1 affected packages
curl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
curl | Fixed | Fixed | Fixed | Fixed | Fixed |
CVE-2024-6874
Low prioritylibcurl's URL API function [curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) offers punycode conversions, to and from IDN. Asking to convert a name that is exactly 256 bytes, libcurl ends up reading outside of a stack...
1 affected packages
curl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
curl | Not affected | Not affected | Not affected | Not affected | Not affected |
CVE-2024-6197
Medium prioritylibcurl's ASN1 parser has this utf8asn1str() function used for parsing an ASN.1 UTF-8 string. Itcan detect an invalid field and return error. Unfortunately, when doing so it also invokes `free()` on a 4 byte localstack buffer. ...
1 affected packages
curl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
curl | Not affected | Not affected | Not affected | Not affected | Not affected |
CVE-2024-2466
Medium prioritylibcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was...
1 affected packages
curl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
curl | Not affected | Not affected | Not affected | Not affected | Not affected |
CVE-2024-2398
Medium priorityWhen an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting,...
1 affected packages
curl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
curl | Fixed | Fixed | Fixed | Fixed | Fixed |
CVE-2024-2379
Low prioritylibcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns...
1 affected packages
curl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
curl | Not affected | Not affected | Not affected | Not affected | Not affected |
CVE-2024-2004
Low priorityWhen a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would...
1 affected packages
curl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
curl | Fixed | Not affected | Not affected | Not affected | Not affected |
CVE-2024-0853
Low prioritycurl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still...
1 affected packages
curl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
curl | Fixed | Not affected | Not affected | Not affected | Not affected |