First published: Wed Nov 29 2023(Updated: )
Last updated 24 July 2024
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Haxx Curl | >=7.84.0<8.5.0 | |
Fedoraproject Fedora | =38 | |
redhat/curl | <8.5.0 | 8.5.0 |
debian/curl | <=7.74.0-1.3+deb11u13<=7.74.0-1.3+deb11u11 | 7.88.1-10+deb12u7 7.88.1-10+deb12u5 8.9.1-2 8.10.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46219 is a vulnerability in the curl package that allows an attacker to clear the contents of a file with a long name when using HTTP Strict Transport Security (HSTS).
The affected software versions include curl 8.5.0 and earlier, curl 7.88.1-8ubuntu2.4 and earlier, curl 8.2.1-1ubuntu3.2 and earlier, and curl 7.64.0-4+deb10u2 to curl 8.4.0-2.
To fix the CVE-2023-46219 vulnerability, update the curl package to a version that includes the necessary security patches.
You can find more information about CVE-2023-46219 on the MITRE CVE website (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46219) and the curl documentation (https://curl.se/docs/CVE-2023-46219.html).
Yes, you can refer to the Ubuntu security notice USN-6535-1 (https://ubuntu.com/security/notices/USN-6535-1) for more information on the CVE-2023-46219 vulnerability.