First published: Tue Oct 03 2023(Updated: )
Accessibility. A privacy issue was addressed with improved private data redaction for log entries.
Credit: support@hackerone.com CVE-2023-38545 CVE-2023-38039 CVE-2023-38546 CVE-2023-42915 Noah Roskin-Frazee Pr Kirin @Pwnrin Ivan Fratric Google Project Zero Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativeMickey Jin @patch1t an anonymous researcher Marc Newlin SkySafeKoh M. Nakagawa @tsunek0h Yann GASCUEL Alter SolutionsAnthony Cruz Tyrant Corp @App Wojciech Regula SecuRingZhenjiang Zhao Pangu TeamQianxin Junsung Lee Meysam Firouzi @R00tkitSMM Pan ZhenPeng @Peterpan0927 STAR Labs SG PteEloi Benoist-Vanderbeken @elvanderb SynacktivCVE-2023-42893 CVE-2023-3618 CVE-2020-19185 CVE-2020-19186 CVE-2020-19187 CVE-2020-19188 CVE-2020-19189 CVE-2020-19190 Ron Masas BreakPointCsaba Fitzl @theevilbit OffSecCsaba Fitzl @theevilbit Offensive SecurityArsenii Kostromin (0x3c3e) Mattie Behrens Joshua Jewett @JoshJewett33 Zhongquan Li @Guluisacat Zhongquan Li @Guluisacat Dawn Security Lab of JingDongCVE-2023-5344 Pwn2car Zoom Offensive Security Team Nan Wang @eternalsakura13 360 Vulnerability Research Instituterushikesh nandedkar SungKwon Lee (Demon.Team) Don Clarke
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.7.3 | 12.7.3 |
ubuntu/curl | <7.58.0-2ubuntu3.24+ | 7.58.0-2ubuntu3.24+ |
ubuntu/curl | <7.68.0-1ubuntu2.20 | 7.68.0-1ubuntu2.20 |
ubuntu/curl | <7.81.0-1ubuntu1.14 | 7.81.0-1ubuntu1.14 |
ubuntu/curl | <7.88.1-8ubuntu2.3 | 7.88.1-8ubuntu2.3 |
ubuntu/curl | <8.2.1-1ubuntu3.1 | 8.2.1-1ubuntu3.1 |
ubuntu/curl | <8.2.1-1ubuntu3.1 | 8.2.1-1ubuntu3.1 |
ubuntu/curl | <7.35.0-1ubuntu2.20+ | 7.35.0-1ubuntu2.20+ |
ubuntu/curl | <7.47.0-1ubuntu2.19+ | 7.47.0-1ubuntu2.19+ |
debian/curl | 7.74.0-1.3+deb11u12 7.74.0-1.3+deb11u11 7.88.1-10+deb12u6 7.88.1-10+deb12u5 8.8.0-4 8.9.1-1 | |
redhat/curl | <8.4.0 | 8.4.0 |
Apple macOS | <14.2 | 14.2 |
Apple macOS | <13.6.4 | 13.6.4 |
libcurl | >=7.9.1<8.4.0 | |
Apple iOS, iPadOS, and watchOS | <16.7.5 | 16.7.5 |
Apple iOS, iPadOS, and watchOS | <16.7.5 | 16.7.5 |
Fortinet FortiExtender Firmware | >=7.4.0<=7.4.1 | |
Fortinet FortiExtender Firmware | >=7.2.0<=7.2.3 | |
Fortinet FortiOS | >=7.4.0<=7.4.1 | |
Fortinet FortiOS | >=7.2.0<=7.2.6 | |
Fortinet FortiOS | >=7.0.1<=7.0.13 | |
Fortinet FortiProxy | >=7.4.0<=7.4.1 | |
Fortinet FortiProxy | >=7.2.0<=7.2.7 | |
Fortinet FortiProxy | >=7.0 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-38546 is a vulnerability in curl that allows cookie injection with none file.
CVE-2023-38546 affects Ubuntu versions 7.68.0-1ubuntu2.20, 7.81.0-1ubuntu1.14, and 7.88.1-8ubuntu2.3.
CVE-2023-38546 affects Debian versions 7.64.0-4+deb10u7, 7.74.0-1.3+deb11u10, 7.88.1-10+deb12u4, and 8.3.0-3.
You can find more information about CVE-2023-38546 on the MITRE CVE website, the curl documentation, and the Ubuntu security notices page.
To fix CVE-2023-38546, update curl to the recommended versions provided by the respective Linux distributions.