When curl is used to retrieve and parse cookies from an HTTP(S) server, it accepts cookies using control codes (byte values below 32). When cookies that contain such control codes are later sent back to an HTTP(S) server, it might make the server return a 400 response. Effectively allowing a "sister site" to deny service to siblings. Reference: https://curl.se/docs/CVE-2022-35252.html
Created curl tracking bugs for this issue: Affects: fedora-all [bug 2122881] Created mingw-curl tracking bugs for this issue: Affects: fedora-all [bug 2122882]
This issue has been addressed in the following products: JBoss Core Services on RHEL 7 JBoss Core Services for RHEL 8 Via RHSA-2022:8840 https://access.redhat.com/errata/RHSA-2022:8840
This issue has been addressed in the following products: Red Hat JBoss Core Services Via RHSA-2022:8841 https://access.redhat.com/errata/RHSA-2022:8841
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2478 https://access.redhat.com/errata/RHSA-2023:2478
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2963 https://access.redhat.com/errata/RHSA-2023:2963
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-35252