Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2024-2398

Published: 27 March 2024

When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.

Notes

AuthorNote
mdeslaur
affects curl 7.44.0 to and including 8.6.0
introduced in https://github.com/curl/curl/commit/ea7134ac874a66107e54ff9

Priority

Medium

Status

Package Release Status
curl
Launchpad, Ubuntu, Debian
bionic
Released (7.58.0-2ubuntu3.24+esm4)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
focal
Released (7.68.0-1ubuntu2.22)
jammy
Released (7.81.0-1ubuntu1.16)
mantic
Released (8.2.1-1ubuntu3.3)
trusty Not vulnerable

upstream
Released (8.7.0)
xenial
Released (7.47.0-1ubuntu2.19+esm12)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
Patches:
upstream: https://github.com/curl/curl/commit/deca8039991886a559b67bcd6