CVE-2024-2398

Name
CVE-2024-2398
Description
When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
2499f714-1537-4658-8207-48ae4bb9eae9 https://curl.se/docs/CVE-2024-2398.html
2499f714-1537-4658-8207-48ae4bb9eae9 https://curl.se/docs/CVE-2024-2398.json
2499f714-1537-4658-8207-48ae4bb9eae9 https://hackerone.com/reports/2402845
2499f714-1537-4658-8207-48ae4bb9eae9 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
2499f714-1537-4658-8207-48ae4bb9eae9 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
2499f714-1537-4658-8207-48ae4bb9eae9 http://www.openwall.com/lists/oss-security/2024/03/27/3
2499f714-1537-4658-8207-48ae4bb9eae9 https://security.netapp.com/advisory/ntap-20240503-0009/
https://support.apple.com/kb/HT214119
https://support.apple.com/kb/HT214118
https://support.apple.com/kb/HT214120
http://seclists.org/fulldisclosure/2024/Jul/20
http://seclists.org/fulldisclosure/2024/Jul/18
http://seclists.org/fulldisclosure/2024/Jul/19

Match rules

CPE URI Source package Min version Max version
curl >= 0 <= 8.6.0
curl >= 0 <= 8.5.0
curl >= 0 <= 8.4.0
curl >= 0 <= 8.3.0
curl >= 0 <= 8.2.1
curl >= 0 <= 8.2.0
curl >= 0 <= 8.1.2
curl >= 0 <= 8.1.1
curl >= 0 <= 8.1.0
curl >= 0 <= 8.0.1
curl >= 0 <= 8.0.0
curl >= 0 <= 7.88.1
curl >= 0 <= 7.88.0
curl >= 0 <= 7.87.0
curl >= 0 <= 7.86.0
curl >= 0 <= 7.85.0
curl >= 0 <= 7.84.0
curl >= 0 <= 7.83.1
curl >= 0 <= 7.83.0
curl >= 0 <= 7.82.0
curl >= 0 <= 7.81.0
curl >= 0 <= 7.80.0
curl >= 0 <= 7.79.1
curl >= 0 <= 7.79.0
curl >= 0 <= 7.78.0
curl >= 0 <= 7.77.0
curl >= 0 <= 7.76.1
curl >= 0 <= 7.76.0
curl >= 0 <= 7.75.0
curl >= 0 <= 7.74.0
curl >= 0 <= 7.73.0
curl >= 0 <= 7.72.0
curl >= 0 <= 7.71.1
curl >= 0 <= 7.71.0
curl >= 0 <= 7.70.0
curl >= 0 <= 7.69.1
curl >= 0 <= 7.69.0
curl >= 0 <= 7.68.0
curl >= 0 <= 7.67.0
curl >= 0 <= 7.66.0
curl >= 0 <= 7.65.3
curl >= 0 <= 7.65.2
curl >= 0 <= 7.65.1
curl >= 0 <= 7.65.0
curl >= 0 <= 7.64.1
curl >= 0 <= 7.64.0
curl >= 0 <= 7.63.0
curl >= 0 <= 7.62.0
curl >= 0 <= 7.61.1
curl >= 0 <= 7.61.0
curl >= 0 <= 7.60.0
curl >= 0 <= 7.59.0
curl >= 0 <= 7.58.0
curl >= 0 <= 7.57.0
curl >= 0 <= 7.56.1
curl >= 0 <= 7.56.0
curl >= 0 <= 7.55.1
curl >= 0 <= 7.55.0
curl >= 0 <= 7.54.1
curl >= 0 <= 7.54.0
curl >= 0 <= 7.53.1
curl >= 0 <= 7.53.0
curl >= 0 <= 7.52.1
curl >= 0 <= 7.52.0
curl >= 0 <= 7.51.0
curl >= 0 <= 7.50.3
curl >= 0 <= 7.50.2
curl >= 0 <= 7.50.1
curl >= 0 <= 7.50.0
curl >= 0 <= 7.49.1
curl >= 0 <= 7.49.0
curl >= 0 <= 7.48.0
curl >= 0 <= 7.47.1
curl >= 0 <= 7.47.0
curl >= 0 <= 7.46.0
curl >= 0 <= 7.45.0
curl >= 0 <= 7.44.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status