First published: Wed Nov 29 2023(Updated: )
When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Haxx Curl | >=7.84.0<8.5.0 | |
Fedoraproject Fedora | =38 | |
redhat/curl | <8.5.0 | 8.5.0 |
ubuntu/curl | <7.88.1-8ubuntu2.4 | 7.88.1-8ubuntu2.4 |
ubuntu/curl | <8.2.1-1ubuntu3.2 | 8.2.1-1ubuntu3.2 |
ubuntu/curl | <8.5.0-2ubuntu1 | 8.5.0-2ubuntu1 |
ubuntu/curl | <8.5.0 | 8.5.0 |
debian/curl | <=7.74.0-1.3+deb11u11 | 7.64.0-4+deb10u2 7.64.0-4+deb10u9 7.88.1-10+deb12u5 8.7.1-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46219 is a vulnerability in the curl package that allows an attacker to clear the contents of a file with a long name when using HTTP Strict Transport Security (HSTS).
The affected software versions include curl 8.5.0 and earlier, curl 7.88.1-8ubuntu2.4 and earlier, curl 8.2.1-1ubuntu3.2 and earlier, and curl 7.64.0-4+deb10u2 to curl 8.4.0-2.
To fix the CVE-2023-46219 vulnerability, update the curl package to a version that includes the necessary security patches.
You can find more information about CVE-2023-46219 on the MITRE CVE website (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46219) and the curl documentation (https://curl.se/docs/CVE-2023-46219.html).
Yes, you can refer to the Ubuntu security notice USN-6535-1 (https://ubuntu.com/security/notices/USN-6535-1) for more information on the CVE-2023-46219 vulnerability.