{"id":"USN-6718-1","summary":"curl vulnerabilities","details":"Dan Fandrich discovered that curl would incorrectly use the default set of\nprotocols when a parameter option disabled all protocols without adding\nany, contrary to expectations. This issue only affected Ubuntu 23.10.\n(CVE-2024-2004)\n\nIt was discovered that curl incorrectly handled memory when limiting the\namount of headers when HTTP/2 server push is allowed. A remote attacker\ncould possibly use this issue to cause curl to consume resources, leading\nto a denial of service. (CVE-2024-2398)\n","modified":"2026-04-27T17:02:09.065898492Z","published":"2024-03-27T11:43:38Z","related":["UBUNTU-CVE-2024-2004","UBUNTU-CVE-2024-2398"],"upstream":["CVE-2024-2004","CVE-2024-2398","UBUNTU-CVE-2024-2004","UBUNTU-CVE-2024-2398"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6718-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-2004"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-2398"}],"affected":[{"package":{"name":"curl","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/curl@7.68.0-1ubuntu2.22?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.68.0-1ubuntu2.22"}]}],"versions":["7.65.3-1ubuntu3","7.65.3-1ubuntu4","7.66.0-1ubuntu1","7.67.0-2ubuntu1","7.68.0-1ubuntu1","7.68.0-1ubuntu2","7.68.0-1ubuntu2.1","7.68.0-1ubuntu2.2","7.68.0-1ubuntu2.4","7.68.0-1ubuntu2.5","7.68.0-1ubuntu2.6","7.68.0-1ubuntu2.7","7.68.0-1ubuntu2.10","7.68.0-1ubuntu2.11","7.68.0-1ubuntu2.12","7.68.0-1ubuntu2.13","7.68.0-1ubuntu2.14","7.68.0-1ubuntu2.15","7.68.0-1ubuntu2.16","7.68.0-1ubuntu2.18","7.68.0-1ubuntu2.19","7.68.0-1ubuntu2.20","7.68.0-1ubuntu2.21"],"ecosystem_specific":{"binaries":[{"binary_name":"curl","binary_version":"7.68.0-1ubuntu2.22"},{"binary_name":"libcurl3-gnutls","binary_version":"7.68.0-1ubuntu2.22"},{"binary_name":"libcurl3-nss","binary_version":"7.68.0-1ubuntu2.22"},{"binary_name":"libcurl4","binary_version":"7.68.0-1ubuntu2.22"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2024-2398","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6718-1.json"}},{"package":{"name":"curl","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/curl@7.81.0-1ubuntu1.16?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.81.0-1ubuntu1.16"}]}],"versions":["7.74.0-1.3ubuntu2","7.74.0-1.3ubuntu3","7.80.0-3","7.81.0-1","7.81.0-1ubuntu1.1","7.81.0-1ubuntu1.2","7.81.0-1ubuntu1.3","7.81.0-1ubuntu1.4","7.81.0-1ubuntu1.6","7.81.0-1ubuntu1.7","7.81.0-1ubuntu1.8","7.81.0-1ubuntu1.10","7.81.0-1ubuntu1.11","7.81.0-1ubuntu1.13","7.81.0-1ubuntu1.14","7.81.0-1ubuntu1.15"],"ecosystem_specific":{"binaries":[{"binary_name":"curl","binary_version":"7.81.0-1ubuntu1.16"},{"binary_name":"libcurl3-gnutls","binary_version":"7.81.0-1ubuntu1.16"},{"binary_name":"libcurl3-nss","binary_version":"7.81.0-1ubuntu1.16"},{"binary_name":"libcurl4","binary_version":"7.81.0-1ubuntu1.16"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2024-2398","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6718-1.json"}}],"schema_version":"1.7.5"}