6 matches found
CVE-2025-0665
libcurl would wrongly close the same eventfd file descriptor twice when takingdown a connection channel after having completed a threaded name resolve.
CVE-2025-0167
When asked to use a .netrc file for credentials and to follow HTTPredirects, curl could leak the password used for the first host to thefollowed-to host under certain circumstances. This flaw only manifests itself if the netrc file has a default entry thatomits both login and password. A rare circu...
CVE-2025-0725
When libcurl is asked to perform automatic gzip decompression ofcontent-encoded HTTP responses with the CURLOPT_ACCEPT_ENCODING option,using zlib 1.2.0.3 or older , an attacker-controlled integer overflow wouldmake libcurl perform a buffer overflow.
CVE-2025-5399
Due to a mistake in libcurl's WebSocket code, a malicious server can send aparticularly crafted packet which makes libcurl get trapped in an endlessbusy-loop. There is no other way for the application to escape or exit this loop otherthan killing the thread/process. This might be used to DoS libcur...
CVE-2025-4947
libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks.
CVE-2025-5025
libcurl supports pinning of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC an...