Bug 1221665 (CVE-2024-2004) - VUL-0: CVE-2024-2004: curl: Usage of disabled protocol
Summary: VUL-0: CVE-2024-2004: curl: Usage of disabled protocol
Status: RESOLVED FIXED
Alias: CVE-2024-2004
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/398213/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-2004:3.5:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-03-19 08:26 UTC by Alexander Bergmann
Modified: 2024-07-31 12:20 UTC (History)
4 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 3 Alexander Bergmann 2024-03-19 11:59:54 UTC
CRD: 2024-03-27 07:00 UTC
Comment 4 Pedro Monreal Gonzalez 2024-03-21 11:52:06 UTC
These codestreams should be affected:

SUSE:ALP:Source:Standard:1.0:	8.6.0
openSUSE:Factory:		8.6.0
SUSE:SLE-15-SP6:Update:		8.6.0
SUSE:SLE-15-SP4:Update:		8.0.1
SUSE:SLE-12-SP5:Update:		8.0.1


I'll submit the fix to ALP, Factory and SP6 after the CRD.
Comment 7 Marcus Meissner 2024-03-27 14:51:06 UTC
is public via oss-sec



Usage of disabled protocol
==========================

Project curl Security Advisory, March 27 2024 -
[Permalink](https://curl.se/docs/CVE-2024-2004.html)

VULNERABILITY
-------------

When a protocol selection parameter option disables all protocols without
adding any then the default set of protocols would remain in the allowed set
due to an error in the logic for removing protocols. The below command would
perform a request to curl.se with a plaintext protocol which has been
explicitly disabled.

     curl --proto -all,-http http://curl.se

The flaw is only present if the set of selected protocols disables the entire
set of available protocols, in itself a command with no practical use and
therefore unlikely to be encountered in real situations. The curl security team
has thus assessed this to be low severity bug.

INFO
----

The Common Vulnerabilities and Exposures (CVE) project has assigned the name
CVE-2024-2004 to this issue.

CWE-115: Misinterpretation of Input

Severity: Low

AFFECTED VERSIONS
-----------------

- Affected versions: curl 7.85.0 to and including 8.6.0
- Not affected versions: curl < 7.85.0 and >= 8.7.0
- Introduced-in: https://github.com/curl/curl/commit/e6f8445edef8e7996d1

libcurl is used by many applications, but not always advertised as such!

This flaw is also accessible using the curl command line tool.

SOLUTION
------------

Starting in curl 8.7.0, the set of allowed protocols is cleared before the set
of disabled protocols is inspected, leaving all protocols disabled even in the
error path.

- Fixed-in: https://github.com/curl/curl/commit/17d302e56221

RECOMMENDATIONS
--------------

  A - Upgrade curl to version 8.7.0

  B - Apply the patch to your local version

  C - Inspect any scripts which constructs curl commands with `--proto` options
      to make sure there is at least one allowed protocol

TIMELINE
--------

This issue was reported to the curl project on February 15, 2024. We contacted
distros@openwall on March 19, 2024.

curl 8.7.0 was released on March 27 2024 around 07:00 UTC, coordinated with
the publication of this advisory.

The curl security team is not aware of any active exploits using this
vulnerability.

CREDITS
-------

- Reported-by: Dan Fandrich
- Patched-by: Daniel Gustafsson
Comment 9 Pedro Monreal Gonzalez 2024-03-27 19:32:05 UTC
Factory submission: https://build.opensuse.org/request/show/1163136
Comment 11 Maintenance Automation 2024-04-05 16:30:07 UTC
SUSE-SU-2024:1120-1: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1221665, 1221667
CVE References: CVE-2024-2004, CVE-2024-2398
Maintenance Incident: [SUSE:Maintenance:33127](https://smelt.suse.de/incident/33127/)
Sources used:
SUSE Linux Enterprise Micro 5.1 (src):
 curl-7.66.0-150200.4.69.1
SUSE Linux Enterprise Micro 5.2 (src):
 curl-7.66.0-150200.4.69.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src):
 curl-7.66.0-150200.4.69.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Maintenance Automation 2024-04-08 12:30:24 UTC
SUSE-SU-2024:1151-1: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1221665, 1221667
CVE References: CVE-2024-2004, CVE-2024-2398
Maintenance Incident: [SUSE:Maintenance:33125](https://smelt.suse.de/incident/33125/)
Sources used:
openSUSE Leap 15.4 (src):
 curl-8.0.1-150400.5.44.1
openSUSE Leap Micro 5.3 (src):
 curl-8.0.1-150400.5.44.1
openSUSE Leap Micro 5.4 (src):
 curl-8.0.1-150400.5.44.1
openSUSE Leap 15.5 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise High Performance Computing 15 SP4 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise Server 15 SP4 (src):
 curl-8.0.1-150400.5.44.1
SUSE Manager Server 4.3 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise Desktop 15 SP4 (src):
 curl-8.0.1-150400.5.44.1
SUSE Manager Retail Branch Server 4.3 (src):
 curl-8.0.1-150400.5.44.1
SUSE Manager Proxy 4.3 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise High Performance Computing 15 SP5 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise Server 15 SP5 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise Server for SAP Applications 15 SP5 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise Desktop 15 SP5 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise Micro 5.3 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise Micro 5.4 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise Micro 5.5 (src):
 curl-8.0.1-150400.5.44.1
Basesystem Module 15-SP5 (src):
 curl-8.0.1-150400.5.44.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Maintenance Automation 2024-04-08 12:30:27 UTC
SUSE-SU-2024:1150-1: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1221665, 1221667
CVE References: CVE-2024-2004, CVE-2024-2398
Maintenance Incident: [SUSE:Maintenance:33126](https://smelt.suse.de/incident/33126/)
Sources used:
SUSE Linux Enterprise Software Development Kit 12 SP5 (src):
 curl-8.0.1-11.86.2
SUSE Linux Enterprise High Performance Computing 12 SP5 (src):
 curl-8.0.1-11.86.2
SUSE Linux Enterprise Server 12 SP5 (src):
 curl-8.0.1-11.86.2
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src):
 curl-8.0.1-11.86.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 15 Maintenance Automation 2024-05-06 16:30:02 UTC
SUSE-SU-2024:1151-2: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1221665, 1221667
CVE References: CVE-2024-2004, CVE-2024-2398
Maintenance Incident: [SUSE:Maintenance:33125](https://smelt.suse.de/incident/33125/)
Sources used:
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 curl-8.0.1-150400.5.44.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 curl-8.0.1-150400.5.44.1
SUSE Manager Proxy 4.3 (src):
 curl-8.0.1-150400.5.44.1
SUSE Manager Retail Branch Server 4.3 (src):
 curl-8.0.1-150400.5.44.1
SUSE Manager Server 4.3 (src):
 curl-8.0.1-150400.5.44.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.