USN-6718-1: curl vulnerabilities
27 March 2024
Several security issues were fixed in curl.
Releases
Packages
- curl - HTTP, HTTPS, and FTP client and client libraries
Details
Dan Fandrich discovered that curl would incorrectly use the default set of
protocols when a parameter option disabled all protocols without adding
any, contrary to expectations. This issue only affected Ubuntu 23.10.
(CVE-2024-2004)
It was discovered that curl incorrectly handled memory when limiting the
amount of headers when HTTP/2 server push is allowed. A remote attacker
could possibly use this issue to cause curl to consume resources, leading
to a denial of service. (CVE-2024-2398)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.10
-
curl
-
8.2.1-1ubuntu3.3
-
libcurl3-gnutls
-
8.2.1-1ubuntu3.3
-
libcurl3-nss
-
8.2.1-1ubuntu3.3
-
libcurl4
-
8.2.1-1ubuntu3.3
Ubuntu 22.04
-
curl
-
7.81.0-1ubuntu1.16
-
libcurl3-gnutls
-
7.81.0-1ubuntu1.16
-
libcurl3-nss
-
7.81.0-1ubuntu1.16
-
libcurl4
-
7.81.0-1ubuntu1.16
Ubuntu 20.04
-
curl
-
7.68.0-1ubuntu2.22
-
libcurl3-gnutls
-
7.68.0-1ubuntu2.22
-
libcurl3-nss
-
7.68.0-1ubuntu2.22
-
libcurl4
-
7.68.0-1ubuntu2.22
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6718-3: libcurl4-doc, curl, libcurl3t64-gnutls, libcurl4-openssl-dev, libcurl4-gnutls-dev, libcurl4t64
- USN-6718-2: libcurl4, libcurl3-nss, libcurl4-doc, curl, libcurl4-openssl-dev, libcurl4-nss-dev, libcurl3, libcurl4-gnutls-dev, libcurl3-gnutls