When saving HSTS data to an excessively long file name, curl could end up
removing all contents, making subsequent requests using that file unaware of
the HSTS status they should otherwise use.
removing all contents, making subsequent requests using that file unaware of
the HSTS status they should otherwise use.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5587-1 | curl security update |
Ubuntu USN |
USN-6535-1 | curl vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 02 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 04 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Feb 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use. | When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use. |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-12-02T20:03:27.875Z
Reserved: 2023-10-19T01:00:12.854Z
Link: CVE-2023-46219
Updated: 2025-11-04T19:25:34.066Z
Status : Modified
Published: 2023-12-12T02:15:06.990
Modified: 2025-12-02T20:15:48.023
Link: CVE-2023-46219
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN