curl / Docs / Vulnerability table / 8.11.1 vulnerabilities

Vulnerabilities in curl 8.11.1

curl version 8.11.1 was released on December 11 2024

It has the following 23 published security problems.

FlawFrom versionTo and including
cross-proxy Digest auth state leak7.12.08.19.0
netrc credential leak with reused proxy connection7.14.08.19.0
stale custom cookie host causes cookie leak7.71.08.19.0
proxy credentials leak over redirect-to proxy7.14.18.19.0
wrong reuse of SMB connection7.40.08.19.0
wrong reuse of HTTP Negotiate connection7.10.68.19.0
connection reuse ignores TLS requirement7.20.08.19.0
wrong proxy connection reuse with credentials7.78.18.0
token leak with redirect and netrc7.33.08.18.0
bad reuse of HTTP Negotiate connection7.10.68.18.0
libssh key passphrase bypass without agent set7.58.08.17.0
libssh global known_hosts override7.58.08.17.0
OpenSSL partial chain store policy bypass7.87.08.17.0
bearer token leak on cross-protocol redirect7.33.08.17.0
broken TLS options for threaded LDAPS7.17.08.17.0
No QUIC certificate pinning with GnuTLS8.8.08.17.0
missing SFTP host verification with wolfSSH7.69.08.16.0
predictable WebSocket mask8.11.08.15.0
No QUIC certificate pinning with wolfSSL8.5.08.13.0
QUIC certificate check skip with wolfSSL8.8.08.13.0
gzip integer overflow7.10.58.11.1
eventfd double close8.11.18.11.1
netrc and default credential leak7.76.08.11.1

Further details

CVE data for 8.11.1 provided as JSON.

Changelog for curl 8.11.1

See vulnerability summary for the previous release: 8.11.0 or the subsequent release: 8.12.0