Debian LTS: DLA-3692-1: curl security update
Summary
Additionally, the command line tool does now:
- - display the Debian revision in "curl --version", and
- - does no longer output verbose "Expire in" messsages with "curl -v"
CVE-2023-28322
POST-after-PUT confusion.
CVE-2023-46218
Cookie mixed case PSL bypass.
For Debian 10 buster, these problems have been fixed in version
7.64.0-4+deb10u8.
We recommend that you upgrade your curl packages.
For the detailed security status of curl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/curl
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS