CVE-2024-2398

Updated: 2024-03-28 21:15:58.289098

Description:

When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0
CVSS Version 3.x HIGH 7.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU curl 7.76.1 7.5 HIGH Released CLSA-2024:1712672178 2024-04-09 11:13:27
CentOS 6 ELS curl 7.19.7 7.5 HIGH Not Vulnerable 2024-04-02 11:09:19
CentOS 7 ELS curl 7.29.0 7.5 HIGH Not Vulnerable 2024-04-02 11:09:19
CentOS 8.4 ELS curl 7.61.1 7.5 HIGH Released CLSA-2024:1712837577 2024-04-11 10:04:04
CentOS 8.5 ELS curl 7.61.1 7.5 HIGH Released CLSA-2024:1712837675 2024-04-11 10:04:05
CentOS Stream 8 ELS curl 7.61.1 7.5 HIGH Released CLSA-2024:1724788603 2024-08-27 17:27:33
CloudLinux 6 ELS curl 7.19.7 7.5 HIGH Not Vulnerable 2024-04-02 11:09:19
Oracle Linux 6 ELS curl 7.19.7 7.5 HIGH Not Vulnerable 2024-04-02 11:09:19
Ubuntu 16.04 ELS curl 7.47.0 7.5 HIGH Released CLSA-2024:1712836996 2024-04-11 10:04:06
Ubuntu 18.04 ELS curl 7.58.0-2 7.5 HIGH Released CLSA-2024:1713333661 2024-04-17 05:09:18