Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update: curl #1406

Closed
dongsupark opened this issue Mar 27, 2024 · 0 comments · Fixed by flatcar/scripts#1854
Closed

update: curl #1406

dongsupark opened this issue Mar 27, 2024 · 0 comments · Fixed by flatcar/scripts#1854
Labels
advisory security advisory security security concerns

Comments

@dongsupark
Copy link
Member

dongsupark commented Mar 27, 2024

Name: curl
CVEs: CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466
CVSSs: n/a, n/a, n/a, n/a
Action Needed: update to >= 8.7.1 (8.7.0 had a regression)

Summary:

  • CVE-2024-2004: When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled. curl --proto -all,-http http://curl.se The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.
  • CVE-2024-2379: libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.
  • CVE-2024-2398: When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.
  • CVE-2024-2466: When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.

refmap.gentoo: TBD

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
advisory security advisory security security concerns
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant