When saving HSTS data to an excessively long file name, curl could end up
removing all contents, making subsequent requests using that file unaware of
the HSTS status they should otherwise use.
removing all contents, making subsequent requests using that file unaware of
the HSTS status they should otherwise use.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5587-1 | curl security update |
Ubuntu USN |
USN-6535-1 | curl vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Feb 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use. | When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use. |
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-11-04T19:25:34.066Z
Reserved: 2023-10-19T01:00:12.854Z
Link: CVE-2023-46219
No data.
Status : Modified
Published: 2023-12-12T02:15:06.990
Modified: 2025-11-04T20:17:09.307
Link: CVE-2023-46219
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN