Public bug reported:

libcurl's check to limit outgoing Cookier header field size is broken.
The implementation in Jammy's libcurl4-7.81.0* was backported from a
newer curl (as part of CVE-2022-32205) but that implementation is buggy
and mistakenly checks against the entire outgoing request size, instead
of the cookie header size.

Upstream curl has fixed this, and the (simple) fix should be backported
to here too.

For example, if someone has a big request header (very common with
different authentication schemes like big JWT/bearer tokens or
Kerberos/SPNEGO), curl will drop cookies even though the cookies are
tiny.

Here is curl's original fix for CVS-2022-32205: 
https://github.com/curl/curl/commit/48d7064a49148f03942380967da739dcde1cdc24
Here is the bugfix that correctly tracks the Cookie header size: 
https://github.com/curl/curl/commit/d40e5cc9a3c7c5ba88523be0272f842ca8672357

** Affects: curl (Ubuntu)
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2118865

Title:
  libcurl outgoing Cookie header field size check is broken

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/curl/+bug/2118865/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to