CVE-2023-46219
Publication date 6 December 2023
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.
Read the notes from the security team
Why is this CVE low priority?
Upstream determined this is a low-priority issue
Status
Package | Ubuntu Release | Status |
---|---|---|
curl | 24.04 LTS noble |
Fixed 8.5.0-2ubuntu1
|
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
Notes
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.3 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-6535-1
- curl vulnerabilities
- 6 December 2023