CVE-2023-46219
Published: December 7, 2023Last modified: September 22, 2025
Description
When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score | 5.3 | 
| Attack Vector | NETWORK | 
| Attack complexity | LOW | 
| Privileges required | NONE | 
| User interaction | NONE | 
| Scope | UNCHANGED | 
| Confidentiality | NONE | 
| Integrity impact | LOW | 
| Availability impact | NONE | 
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N | 
Status
| Product | Release | Package | Status | 
|---|---|---|---|
| Alpaquita Linux | 23 LTS | curl | Fixed (8.5.0-r0) | 
| Stream | curl | Fixed (8.5.0-r0) | 
References
- https://curl.se/docs/CVE-2023-46219.html
 - https://hackerone.com/reports/2236133
 - https://lists.fedoraproject.org/archives/list/[email protected]/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/
 - https://security.netapp.com/advisory/ntap-20240119-0007/
 - https://www.debian.org/security/2023/dsa-5587