secure keyword for https://targethttp://target (same
hostname, but using clear text HTTP) using the same cookie setpath=/).
Since this site is not secure, the cookie should just be ignored.The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.
The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Curl | Ubuntu | devel | * | 
| Curl | Ubuntu | esm-infra-legacy/trusty | * | 
| Curl | Ubuntu | esm-infra/bionic | * | 
| Curl | Ubuntu | esm-infra/focal | * | 
| Curl | Ubuntu | esm-infra/xenial | * | 
| Curl | Ubuntu | jammy | * | 
| Curl | Ubuntu | noble | * | 
| Curl | Ubuntu | plucky | * | 
| Curl | Ubuntu | questing | * | 
| Curl | Ubuntu | upstream | * |