First published: Wed Sep 13 2023(Updated: )
It was discovered that curl incorrectly handled certain large headers. A remote attacker could possibly use this issue to cause curl to consume resources, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/curl | <7.88.1-8ubuntu2.2 | 7.88.1-8ubuntu2.2 |
=23.04 | ||
All of | ||
ubuntu/libcurl3-gnutls | <7.88.1-8ubuntu2.2 | 7.88.1-8ubuntu2.2 |
=23.04 | ||
All of | ||
ubuntu/libcurl3-nss | <7.88.1-8ubuntu2.2 | 7.88.1-8ubuntu2.2 |
=23.04 | ||
All of | ||
ubuntu/libcurl4 | <7.88.1-8ubuntu2.2 | 7.88.1-8ubuntu2.2 |
=23.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this curl vulnerability is CVE-2023-38039.
The severity of CVE-2023-38039 is not specified.
This vulnerability affects Ubuntu 23.04 with the affected packages: curl, libcurl3-gnutls, libcurl3-nss, and libcurl4.
To fix the curl vulnerability, update the affected software packages to version 7.88.1-8ubuntu2.2 or later.
You can find more information about this curl vulnerability in the following references: [Reference 1](https://ubuntu.com/security/CVE-2023-38039), [Reference 2](https://launchpad.net/ubuntu/+source/curl/7.88.1-8ubuntu2.2), [Reference 3](https://ubuntu.com/security/notices/USN-6363-1).