secure
keyword for https://target
http://target
(same
hostname, but using clear text HTTP) using the same cookie setpath=/
).
Since this site is not secure, the cookie should just be ignored.The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.
The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Curl | Ubuntu | devel | * |
Curl | Ubuntu | esm-infra-legacy/trusty | * |
Curl | Ubuntu | esm-infra/bionic | * |
Curl | Ubuntu | esm-infra/focal | * |
Curl | Ubuntu | esm-infra/xenial | * |
Curl | Ubuntu | jammy | * |
Curl | Ubuntu | noble | * |
Curl | Ubuntu | plucky | * |
Curl | Ubuntu | upstream | * |