Debian Package Tracker
Register | Log in
Subscribe

curl

command line tool for transferring data with URL syntax

Choose email to subscribe with

general
  • source: curl (main)
  • version: 8.16.0-4
  • maintainer: Debian Curl Maintainers (DMD)
  • uploaders: Sergio Durigan Junior [DMD] – Samuel Henrique [DMD] – Carlos Henrique Lima Melara [DMD]
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 7.74.0-1.3+deb11u13
  • o-o-sec: 7.74.0-1.3+deb11u15
  • o-o-p-u: 7.74.0-1.3+deb11u13
  • oldstable: 7.88.1-10+deb12u14
  • old-sec: 7.88.1-10+deb12u5
  • old-bpo: 8.14.1-2~bpo12+1
  • stable: 8.14.1-2
  • stable-bpo: 8.16.0-1~bpo13+1
  • testing: 8.16.0-4
  • unstable: 8.16.0-4
versioned links
  • 7.74.0-1.3+deb11u13: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 7.74.0-1.3+deb11u15: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 7.88.1-10+deb12u5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 7.88.1-10+deb12u14: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.14.1-2~bpo12+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.14.1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.16.0-1~bpo13+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.16.0-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • curl (41 bugs: 1, 30, 10, 0)
  • libcurl3t64-gnutls
  • libcurl4-doc
  • libcurl4-gnutls-dev
  • libcurl4-openssl-dev (4 bugs: 0, 4, 0, 0)
  • libcurl4t64
action needed
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2025-10-12 Last update: 2025-10-12 04:30
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2023-03-22 Last update: 2025-10-12 05:32
10 bugs tagged patch in the BTS normal
The BTS contains patches fixing 10 bugs (11 if counting merged bugs), consider including or untagging them.
Created: 2025-01-06 Last update: 2025-10-12 05:00
1 open merge request in Salsa normal
There is 1 open merge request for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-09-28 Last update: 2025-10-11 16:31
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2025-10-09 Last update: 2025-10-09 03:31
2 low-priority security issues in trixie low

There are 2 open security issues in trixie.

2 issues left for the package maintainer to handle:
  • CVE-2025-9086: (needs triaging) 1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.
  • CVE-2025-10148: (needs triaging) curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says. Instead it used a fixed mask that persisted and was used throughout the entire connection. A predictable mask pattern allows for a malicious server to induce traffic between the two communicating parties that could be interpreted by an involved proxy (configured or transparent) as genuine, real, HTTP traffic with content and thereby poison its cache. That cached poisoned content could then be served to all users of that proxy.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-09-10 Last update: 2025-10-11 05:04
2 low-priority security issues in bookworm low

There are 2 open security issues in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2025-9086: (needs triaging) 1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.

You can find information about how to handle this issue in the security team's documentation.

1 ignored issue:
  • CVE-2025-10148: curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says. Instead it used a fixed mask that persisted and was used throughout the entire connection. A predictable mask pattern allows for a malicious server to induce traffic between the two communicating parties that could be interpreted by an involved proxy (configured or transparent) as genuine, real, HTTP traffic with content and thereby poison its cache. That cached poisoned content could then be served to all users of that proxy.
Created: 2025-09-10 Last update: 2025-10-11 05:04
debian/patches: 2 patches to forward upstream low

Among the 6 debian patches available in version 8.16.0-4 of the package, we noticed the following issues:

  • 2 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-10-09 12:02
news
[rss feed]
  • [2025-10-11] Accepted curl 8.16.0-4~bpo13+1 (source) into stable-backports (Samuel Henrique)
  • [2025-10-11] Accepted curl 8.17.0~rc1-1~exp1 (source) into experimental (Samuel Henrique)
  • [2025-10-11] curl 8.16.0-4 MIGRATED to testing (Debian testing watch)
  • [2025-10-08] Accepted curl 8.16.0-4 (source) into unstable (Carlos Henrique Lima Melara)
  • [2025-10-08] curl 8.16.0-2 MIGRATED to testing (Debian testing watch)
  • [2025-10-07] Accepted curl 8.16.0-3 (source) into unstable (Samuel Henrique)
  • [2025-10-02] Accepted curl 8.16.0-2 (source) into unstable (Samuel Henrique)
  • [2025-09-28] Accepted curl 8.16.0-1+exp1 (source) into experimental (Samuel Henrique)
  • [2025-09-20] Accepted curl 8.16.0-1~bpo13+1 (source) into stable-backports (Samuel Henrique)
  • [2025-09-18] curl 8.16.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-09-17] Accepted curl 8.15.0-1~bpo13+1 (source amd64 all) into stable-backports (Debian FTP Masters) (signed by: Samuel Henrique)
  • [2025-09-10] Accepted curl 8.16.0-1 (source) into unstable (Samuel Henrique)
  • [2025-09-05] Accepted curl 8.16.0~rc3-1 (source) into unstable (Carlos Henrique Lima Melara)
  • [2025-08-30] Accepted curl 8.16.0~rc2-2 (source) into unstable (Sergio Durigan Junior)
  • [2025-08-25] Accepted curl 8.16.0~rc2-1 (source) into unstable (Samuel Henrique)
  • [2025-08-21] curl 8.15.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-18] Accepted curl 8.16.0~rc1-1~exp1 (source) into experimental (Samuel Henrique)
  • [2025-08-10] Accepted curl 8.15.0-1 (source) into unstable (Samuel Henrique)
  • [2025-07-29] Accepted curl 7.88.1-10+deb12u14 (source) into proposed-updates (Debian FTP Masters) (signed by: Samuel Henrique)
  • [2025-07-19] Accepted curl 8.15.0-1~exp1 (source) into experimental (Samuel Henrique)
  • [2025-07-11] Accepted curl 8.15.0~rc3-1~exp1 (source) into experimental (Carlos Henrique Lima Melara)
  • [2025-07-01] Accepted curl 8.15.0~rc2-1~exp1 (source) into experimental (Carlos Henrique Lima Melara)
  • [2025-06-29] Accepted curl 8.14.1-2~bpo12+1 (source) into stable-backports (Samuel Henrique)
  • [2025-06-29] curl 8.14.1-2 MIGRATED to testing (Debian testing watch)
  • [2025-06-21] Accepted curl 8.15.0~rc1-1exp1 (source) into experimental (Samuel Henrique)
  • [2025-06-20] Accepted curl 8.14.1-2+exp1 (source) into experimental (Samuel Henrique)
  • [2025-06-19] Accepted curl 8.14.1-2 (source) into unstable (Samuel Henrique)
  • [2025-06-19] Accepted curl 7.88.1-10+deb12u13 (source) into proposed-updates (Debian FTP Masters) (signed by: Carlos Henrique Lima Melara)
  • [2025-06-11] Accepted curl 8.14.1-1~bpo12+1 (source) into stable-backports (Samuel Henrique)
  • [2025-06-11] Accepted curl 7.74.0-1.3+deb11u15 (source) into oldstable-security (Carlos Henrique Lima Melara)
  • 1
  • 2
bugs [bug history graph]
  • all: 59 64
  • RC: 1
  • I&N: 48 51
  • M&W: 10 12
  • F&P: 0
  • patch: 10 11
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 8.14.1-1ubuntu3
  • 79 bugs (4 patches)
  • patches for 8.14.1-2ubuntu1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing