Debian Package Tracker
Register | Log in
Subscribe

curl

command line tool for transferring data with URL syntax

Choose email to subscribe with

general
  • source: curl (main)
  • version: 8.16.0-1
  • maintainer: Debian Curl Maintainers (DMD)
  • uploaders: Sergio Durigan Junior [DMD] – Samuel Henrique [DMD] – Carlos Henrique Lima Melara [DMD]
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 7.74.0-1.3+deb11u13
  • o-o-sec: 7.74.0-1.3+deb11u15
  • o-o-p-u: 7.74.0-1.3+deb11u13
  • oldstable: 7.88.1-10+deb12u12
  • old-sec: 7.88.1-10+deb12u5
  • old-bpo: 8.14.1-2~bpo12+1
  • stable: 8.14.1-2
  • testing: 8.15.0-1
  • unstable: 8.16.0-1
versioned links
  • 7.74.0-1.3+deb11u13: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 7.74.0-1.3+deb11u15: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 7.88.1-10+deb12u5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 7.88.1-10+deb12u12: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.14.1-2~bpo12+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.14.1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.15.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.16.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • curl (41 bugs: 1, 30, 10, 0)
  • libcurl3t64-gnutls
  • libcurl4-doc
  • libcurl4-gnutls-dev
  • libcurl4-openssl-dev (4 bugs: 0, 4, 0, 0)
  • libcurl4t64
action needed
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2025-9086: 1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.
  • CVE-2025-10148: curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says. Instead it used a fixed mask that persisted and was used throughout the entire connection. A predictable mask pattern allows for a malicious server to induce traffic between the two communicating parties that could be interpreted by an involved proxy (configured or transparent) as genuine, real, HTTP traffic with content and thereby poison its cache. That cached poisoned content could then be served to all users of that proxy.
Created: 2025-09-10 Last update: 2025-09-13 05:30
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 5-day delay is over. Check why.
Created: 2025-09-16 Last update: 2025-09-17 21:02
10 bugs tagged patch in the BTS normal
The BTS contains patches fixing 10 bugs (11 if counting merged bugs), consider including or untagging them.
Created: 2025-01-06 Last update: 2025-09-17 21:00
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2023-03-22 Last update: 2025-09-17 17:30
2 new commits since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit 353d399f1998a10ea1526b642b3d00ea5fd65c21
Author: Carlos Henrique Lima Melara <charlesmelara@riseup.net>
Date:   Wed Sep 10 22:21:03 2025 -0300

    d/watch-rc: keep a watch file for curl RC releases
    
    So we can download them with uscan --watchfile debian/watch-rc and them
    gbp import-orig.

commit 95ec8dea6c225299aff20ca00e2ff7944601a3d5
Author: Carlos Henrique Lima Melara <charlesmelara@riseup.net>
Date:   Wed Sep 10 22:09:38 2025 -0300

    d/rules: use DEB_DISTRIBUTION to add configure flags for experimental
    
    We are building curl's experimental features in Debian experimental to
    test them more, but were keeping two different rules files just to
    account for the different configure options. We can use makefile
    conditionals to add the extra flags for us instead and keep a single
    file.
Created: 2025-09-12 Last update: 2025-09-16 21:04
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2025-09-11 Last update: 2025-09-11 04:32
2 low-priority security issues in trixie low

There are 2 open security issues in trixie.

2 issues left for the package maintainer to handle:
  • CVE-2025-9086: (needs triaging) 1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.
  • CVE-2025-10148: (needs triaging) curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says. Instead it used a fixed mask that persisted and was used throughout the entire connection. A predictable mask pattern allows for a malicious server to induce traffic between the two communicating parties that could be interpreted by an involved proxy (configured or transparent) as genuine, real, HTTP traffic with content and thereby poison its cache. That cached poisoned content could then be served to all users of that proxy.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-09-10 Last update: 2025-09-13 05:30
2 low-priority security issues in bookworm low

There are 2 open security issues in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2025-9086: (needs triaging) 1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.

You can find information about how to handle this issue in the security team's documentation.

1 ignored issue:
  • CVE-2025-10148: curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says. Instead it used a fixed mask that persisted and was used throughout the entire connection. A predictable mask pattern allows for a malicious server to induce traffic between the two communicating parties that could be interpreted by an involved proxy (configured or transparent) as genuine, real, HTTP traffic with content and thereby poison its cache. That cached poisoned content could then be served to all users of that proxy.
Created: 2025-09-10 Last update: 2025-09-13 05:30
debian/patches: 1 patch to forward upstream low

Among the 3 debian patches available in version 8.16.0-1 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-09-11 08:31
testing migrations
  • excuses:
    • Migration status for curl (8.15.0-1 to 8.16.0-1): Will attempt migration due to a hint (Any information below is purely informational)
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/c/curl.html
    • ∙ ∙ Should wait for tests relating to curl 8.16.0-1, but forced by elbrus
    • ∙ ∙ autopkgtest for cmake/4.1.1+really3.31.6-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered (failure will be ignored), riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ autopkgtest for curl/8.16.0-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ autopkgtest for libreoffice/4:25.8.1-1: amd64: Pass, arm64: Test triggered (failure will be ignored), i386: Test triggered (failure will be ignored), ppc64el: Test triggered (failure will be ignored), riscv64: Pass, s390x: Pass
    • ∙ ∙ autopkgtest for llvm-toolchain-17/1:17.0.6-22: amd64: Failed (not a regression) ♻ (reference ♻), arm64: Failed (not a regression) ♻ (reference ♻), i386: Failed (not a regression) ♻ (reference ♻), ppc64el: Test triggered (failure will be ignored), riscv64: Failed (not a regression) ♻ (reference ♻), s390x: Pass
    • ∙ ∙ autopkgtest for llvm-toolchain-18/1:18.1.8-18: amd64: Failed (not a regression) ♻ (reference ♻), arm64: Failed (not a regression) ♻ (reference ♻), i386: Pass, ppc64el: Test triggered (failure will be ignored), riscv64: Pass, s390x: Pass
    • ∙ ∙ autopkgtest for llvm-toolchain-19/1:19.1.7-3: amd64: Failed (not a regression) ♻ (reference ♻), arm64: Failed (not a regression) ♻ (reference ♻), i386: Failed (not a regression) ♻ (reference ♻), ppc64el: Test triggered (failure will be ignored), riscv64: Pass, s390x: Pass
    • ∙ ∙ autopkgtest for nodejs/20.19.2+dfsg-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ autopkgtest for pycurl/7.45.6-1: amd64: Regression ♻ (reference ♻), arm64: Regression ♻ (reference ♻), i386: Regression ♻ (reference ♻), ppc64el: Regression ♻ (reference ♻), riscv64: Regression ♻ (reference ♻), s390x: Regression ♻ (reference ♻)
    • ∙ ∙ autopkgtest for ruby-curb/1.0.5-2: amd64: Regression ♻ (reference ♻), arm64: Regression ♻ (reference ♻), i386: Regression ♻ (reference ♻), ppc64el: Regression ♻ (reference ♻), riscv64: Regression ♻ (reference ♻), s390x: Regression ♻ (reference ♻)
    • ∙ ∙ autopkgtest for ruby-ethon/0.16.0-3: amd64: Regression ♻ (reference ♻), arm64: Regression ♻ (reference ♻), i386: Failed (not a regression) ♻ (reference ♻), ppc64el: Regression ♻ (reference ♻), riscv64: Regression ♻ (reference ♻), s390x: Regression ♻ (reference ♻)
    • ∙ ∙ 7 days old (needed 5 days)
news
[rss feed]
  • [2025-09-17] Accepted curl 8.15.0-1~bpo13+1 (source amd64 all) into stable-backports (Debian FTP Masters) (signed by: Samuel Henrique)
  • [2025-09-10] Accepted curl 8.16.0-1 (source) into unstable (Samuel Henrique)
  • [2025-09-05] Accepted curl 8.16.0~rc3-1 (source) into unstable (Carlos Henrique Lima Melara)
  • [2025-08-30] Accepted curl 8.16.0~rc2-2 (source) into unstable (Sergio Durigan Junior)
  • [2025-08-25] Accepted curl 8.16.0~rc2-1 (source) into unstable (Samuel Henrique)
  • [2025-08-21] curl 8.15.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-18] Accepted curl 8.16.0~rc1-1~exp1 (source) into experimental (Samuel Henrique)
  • [2025-08-10] Accepted curl 8.15.0-1 (source) into unstable (Samuel Henrique)
  • [2025-07-29] Accepted curl 7.88.1-10+deb12u14 (source) into proposed-updates (Debian FTP Masters) (signed by: Samuel Henrique)
  • [2025-07-19] Accepted curl 8.15.0-1~exp1 (source) into experimental (Samuel Henrique)
  • [2025-07-11] Accepted curl 8.15.0~rc3-1~exp1 (source) into experimental (Carlos Henrique Lima Melara)
  • [2025-07-01] Accepted curl 8.15.0~rc2-1~exp1 (source) into experimental (Carlos Henrique Lima Melara)
  • [2025-06-29] Accepted curl 8.14.1-2~bpo12+1 (source) into stable-backports (Samuel Henrique)
  • [2025-06-29] curl 8.14.1-2 MIGRATED to testing (Debian testing watch)
  • [2025-06-21] Accepted curl 8.15.0~rc1-1exp1 (source) into experimental (Samuel Henrique)
  • [2025-06-20] Accepted curl 8.14.1-2+exp1 (source) into experimental (Samuel Henrique)
  • [2025-06-19] Accepted curl 8.14.1-2 (source) into unstable (Samuel Henrique)
  • [2025-06-19] Accepted curl 7.88.1-10+deb12u13 (source) into proposed-updates (Debian FTP Masters) (signed by: Carlos Henrique Lima Melara)
  • [2025-06-11] Accepted curl 8.14.1-1~bpo12+1 (source) into stable-backports (Samuel Henrique)
  • [2025-06-11] Accepted curl 7.74.0-1.3+deb11u15 (source) into oldstable-security (Carlos Henrique Lima Melara)
  • [2025-06-10] curl 8.14.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-06-04] Accepted curl 8.14.1-1 (source) into unstable (Samuel Henrique)
  • [2025-06-01] Accepted curl 8.14.0-1 (source) into unstable (Samuel Henrique)
  • [2025-05-28] Accepted curl 8.14.0-1+exp1 (source) into experimental (Samuel Henrique)
  • [2025-05-21] Accepted curl 8.14.0~rc3-1+exp1 (source) into experimental (Samuel Henrique)
  • [2025-05-13] Accepted curl 8.14.0~rc2-1+exp1 (source) into experimental (Carlos Henrique Lima Melara)
  • [2025-05-06] curl 8.13.0-5 MIGRATED to testing (Debian testing watch)
  • [2025-05-06] Accepted curl 8.13.0-5~bpo12+1 (source) into stable-backports (Samuel Henrique)
  • [2025-05-02] Accepted curl 8.14.0~rc1-1+exp1 (source) into experimental (Samuel Henrique)
  • [2025-04-25] Accepted curl 8.13.0-5+exp1 (source) into experimental (Samuel Henrique)
  • 1
  • 2
bugs [bug history graph]
  • all: 59 64
  • RC: 1
  • I&N: 48 51
  • M&W: 10 12
  • F&P: 0
  • patch: 10 11
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 8.14.1-1ubuntu3
  • 81 bugs (4 patches)
  • patches for 8.14.1-1ubuntu3

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing