Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-3805

Опубликовано: 11 мар. 2026
Источник: debian
EPSS Низкий

Описание

When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
curlfixed8.19.0-1package
curlno-dsatrixiepackage
curlnot-affectedbookwormpackage
curlnot-affectedbullseyepackage

Примечания

  • https://curl.se/docs/CVE-2026-3805.html

  • Introduced with: https://github.com/curl/curl/commit/f4831daa9b2a97e8a2921d6b62cc4dfdd0d8646e (curl-8_13_0)

  • Fixed by: https://github.com/curl/curl/commit/e090be9f73a7a71459ef678c7cc4b1f75e3ea883 (curl-8_19_0)

EPSS

Процентиль: 12%
0.00039
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
15 дней назад

When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.

CVSS3: 6.3
redhat
15 дней назад

A flaw was found in curl. When handling a second Server Message Block (SMB) request to the same host, curl incorrectly accesses memory that has already been freed. This memory corruption vulnerability, known as a use-after-free, could allow a remote attacker to potentially execute arbitrary code or cause a denial of service.

CVSS3: 7.5
nvd
15 дней назад

When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.

msrc
13 дней назад

use after free in SMB connection reuse

CVSS3: 7.5
github
15 дней назад

When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.

EPSS

Процентиль: 12%
0.00039
Низкий