A collection of medals
my week: https://lists.haxx.se/pipermail/daniel/2026-March/000148.html
Bug-Bounty: False, zip bombs, "just", badwords, release, new record, NTLM, SMB, 10K downloads, dependencies, nuget
A collection of medals
my week: https://lists.haxx.se/pipermail/daniel/2026-March/000148.html
Bug-Bounty: False, zip bombs, "just", badwords, release, new record, NTLM, SMB, 10K downloads, dependencies, nuget
In two weeks we run the #curl distro meeting. You are invited!
https://daniel.haxx.se/blog/2026/01/28/curl-distro-meeting-2026/
chicken nuget
Insecure #curl packages hosted by Microsoft. They think it's fine.
https://daniel.haxx.se/blog/2026/03/12/chicken-nuget/
@luisfcorreia sure, in theory that could possible be done. But to me that would feel like giving in to them and accepting this as how it needs to be so I will not participate in that.
chicken nuget
Insecure #curl packages hosted by Microsoft. They think it's fine.
https://daniel.haxx.se/blog/2026/03/12/chicken-nuget/
so yeah, I would say that this is most likely satire
they claim "Zero exposure to original source" but surely all popular Open Source project has been read and parsed by every LLM in existence many times over
"Our proprietary AI robots independently recreate any open source project from scratch"
https://malus.sh/
@bsdphk a reasonable conclusion!
vulnerability age in curl
CVE-2026-3784 beat a new #curl record. This flaw existed in curl source code for 24.97 years before it was discovered.
Illustrated in the slightly hard-to-read graph below. The average age of a curl vulnerability when reported is eight years.
https://curl.se/docs/CVE-2026-3784.html
The "badwords" script we use in curl CI to detect words in documentation and source code that we want to avoid took 48 seconds to run just a few days ago.
Then it took 8 seconds after an optimization take by me.
Then 3.6 once the regexes were improved by @icing
Then 1.1 seconds with more [β¦]
Welcome VladimΓr Marek as #curl commit author 1452: https://github.com/curl/curl/pull/20885
curl 8.19.0 with Daniel Stenberg
https://youtu.be/5XoJTh99bPg
The live-streamed video presentation about this #curl release starts in less than two hours at https://www.twitch.tv/curlhacker
As always with curl CVEs, no other resource has the level of detail and exactness about the flaws like the documentation provided at curl.se
CVE-2026-3805: use after free in SMB connection reuse
When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.
https://curl.se/docs/CVE-2026-3805.html
CVE-2026-3784: wrong proxy connection reuse with credentials
curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection [β¦]
CVE-2026-3783: token leak with redirect and netrc
When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances.
CVE-2026-1965: bad reuse of HTTP Negotiate connection
libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request.
https://curl.se/docs/CVE-2026-1965.html
Welcome to #curl 8.19.0
https://daniel.haxx.se/blog/2026/03/11/curl-8-19-0/
8 changes, 4 vulnerabilities and 264 bugs fixed. Enjoy!
(The 4 new CVEs are explained in follow-up toots.)
Code style Banned functions Complexity checks Human reviews Review bots No binary blobs No confusables Document everything Many tests Cl like crazy All the picky compiler options and -Werror Valgrind and sanitizers Static code analyzers Fuzzing (in Cl and non-stop) Cl jobs never βwrite back" Reproducible releases Signed releases, commits, tags code audits 2fa for all committers
Ahead of tomorrows release of four new #curl CVEs I want you to know: we do our very best to secure curl every step of the way. Security is hard.
#OpenSSL 4.0.0-alpha1 is released and current curl master builds and runs fine with it. Even doing ECH,
https://github.com/openssl/openssl/releases/tag/openssl-4.0.0-alpha1
The end of the release cycle is really the peak. When a full cycle's worth of work and efforts are combined into a fresh tarball that is sent out into the cold harsh real world with the ideal outcome that everything just keeps on working exactly like before, ideally a little better.
The night [β¦]
Future Daniel asking a follow-up:
"when you said you ran the code and reproduced this issue, did you then "run the code" as in executed the instructions in a real CPU or did you "run the code" as in guessing what it would do based on your half-assed reading of the code?"
lesson: some people when they say they run the code, don't actually run the code...
https://hackerone.com/reports/3595753
Yesterday a person started sending me emails. Confused, incoherent emails that make no sense. Ramblings. All of them a reply to its previous. A stream of statements from someone clearly not doing well.
Now approaching 100 emails in less than 24 hours from this person.
I have not replied and I [β¦]
A Hackerone alternative primarily targeted for Open Source projects. Yes please.
#Hackerone allows researchers a certain amount of "trial submissions" even when they have a signal value below the lowest accepted threshold for a specific program.
This effectively makes the signal requirement pointless for an individual project as the worst researcher on the platform might [β¦]
Dependency tracking is hard
https://daniel.haxx.se/blog/2026/03/10/dependency-tracking-is-hard/
All details about the new #curl release will be live-streamed as usual, at 09:00 UTC (10:00 CET) tomorrow.
https://www.twitch.tv/curlhacker