CVE-2023-46219

NameCVE-2023-46219
DescriptionWhen saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1057645

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
curl (PTS)buster7.64.0-4+deb10u2fixed
buster (security)7.64.0-4+deb10u9fixed
bullseye (security), bullseye7.74.0-1.3+deb11u11vulnerable
bookworm, bookworm (security)7.88.1-10+deb12u5fixed
sid, trixie8.7.1-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
curlsourcebuster(not affected)
curlsourcebookworm7.88.1-10+deb12u5
curlsource(unstable)8.5.0-11057645

Notes

[bullseye] - curl <ignored> (curl is not built with HSTS support)
[buster] - curl <not-affected> (Not affected by CVE-2022-32207)
Introduced by: https://github.com/curl/curl/commit/20f9dd6bae50b7223171b17ba7798946e74f877f (curl-7_84_0)
The issue is introduced with the fix for CVE-2022-32207.
Fixed by: https://github.com/curl/curl/commit/73b65e94f3531179de45c6f3c836a610e3d0a846 (curl-8_5_0)
https://curl.se/docs/CVE-2023-46219.html

Search for package or bug name: Reporting problems