Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2023-38546

Published: 11 October 2023

This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the program using libcurl. And if using the correct file format of course.

Notes

AuthorNote
Priority reason:
Per upstream, this is a low-severity issue
mdeslaur
introduced in https://github.com/curl/curl/commit/74d5a6fb3b9a96d9f

Priority

Low

Cvss 3 Severity Score

3.7

Score breakdown

Status

Package Release Status
curl
Launchpad, Ubuntu, Debian
bionic
Released (7.58.0-2ubuntu3.24+esm2)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
focal
Released (7.68.0-1ubuntu2.20)
jammy
Released (7.81.0-1ubuntu1.14)
lunar
Released (7.88.1-8ubuntu2.3)
mantic
Released (8.2.1-1ubuntu3.1)
noble
Released (8.2.1-1ubuntu3.1)
trusty
Released (7.35.0-1ubuntu2.20+esm17)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
upstream Needs triage

xenial
Released (7.47.0-1ubuntu2.19+esm10)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
Patches:
upstream: https://github.com/curl/curl/commit/61275672b46d9abb32857404

Severity score breakdown

Parameter Value
Base score 3.7
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact Low
Availability impact None
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N