they can be accessed later via the libcurl headers API.
However, curl did not have a limit in how many or how large headers it would
accept in a response, allowing a malicious server to stream an endless series
of headers and eventually cause curl to run out of heap memory.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-6363-1 | curl vulnerability |
Tue, 02 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-12-02T20:06:21.809Z
Reserved: 2023-07-12T01:00:11.881Z
Link: CVE-2023-38039
Updated: 2024-08-02T17:30:12.356Z
Status : Modified
Published: 2023-09-15T04:15:10.127
Modified: 2025-12-02T20:15:46.680
Link: CVE-2023-38039
OpenCVE Enrichment
No data.
Ubuntu USN