Bugzilla – Bug 1221667
VUL-0: CVE-2024-2398: curl: HTTP/2 push headers memory-leak
Last modified: 2024-07-31 12:20:09 UTC
CRD: 2024-03-27 07:00 UTC
These codestreams should be affected: SUSE:ALP:Source:Standard:1.0: 8.6.0 openSUSE:Factory: 8.6.0 SUSE:SLE-15-SP6:Update: 8.6.0 SUSE:SLE-15-SP4:Update: 8.0.1 SUSE:SLE-15-SP2:Update: 7.66.0 SUSE:SLE-15:Update: 7.60.0 SUSE:SLE-12-SP5:Update: 8.0.1 I'll submit the fix to ALP, Factory and SP6 after the CRD.
Also affected: SUSE:SLE-12-SP4:Update: 7.60.0
is public via oss-sec HTTP/2 push headers memory-leak =============================== Project curl Security Advisory, March 27 2024 - [Permalink](https://curl.se/docs/CVE-2024-2398.html) VULNERABILITY ------------- When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application. INFO ---- If a server sends many `PUSH_PROMISE` frames with an excessive amount of headers, this can lead to multiple megabytes of memory leaked *per response*. HTTP/2 server push is a relatively rarely used feature. The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2024-2398 to this issue. CWE-772: Missing Release of Resource after Effective Lifetime Severity: Medium AFFECTED VERSIONS ----------------- - Affected versions: curl 7.44.0 to and including 8.6.0 - Not affected versions: curl < 7.44.0 and >= 8.7.0 - Introduced-in: https://github.com/curl/curl/commit/ea7134ac874a66107e54ff9 libcurl is used by many applications, but not always advertised as such! This flaw is also accessible using the curl command line tool. SOLUTION ------------ Starting in curl 8.7.0, the entire set of headers is freed appropriately on errors. - Fixed-in: https://github.com/curl/curl/commit/deca8039991886a559b67bcd6 RECOMMENDATIONS -------------- A - Upgrade curl to version 8.7.0 B - Apply the patch to your local version C - Make sure HTTP/2 push is not used TIMELINE -------- This issue was reported to the curl project on March 5, 2024. We contacted distros@openwall on March 19, 2024. curl 8.7.0 was released on March 27 2024 around 07:00 UTC, coordinated with the publication of this advisory. The curl security team is not aware of any active exploits using this vulnerability. CREDITS ------- - Reported-by: w0x42 on hackerone - Patched-by: Stefan Eissing
Factory submission: https://build.opensuse.org/request/show/1163136
SUSE-SU-2024:1120-1: An update that solves two vulnerabilities can now be installed. Category: security (moderate) Bug References: 1221665, 1221667 CVE References: CVE-2024-2004, CVE-2024-2398 Maintenance Incident: [SUSE:Maintenance:33127](https://smelt.suse.de/incident/33127/) Sources used: SUSE Linux Enterprise Micro 5.1 (src): curl-7.66.0-150200.4.69.1 SUSE Linux Enterprise Micro 5.2 (src): curl-7.66.0-150200.4.69.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): curl-7.66.0-150200.4.69.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:1151-1: An update that solves two vulnerabilities can now be installed. Category: security (moderate) Bug References: 1221665, 1221667 CVE References: CVE-2024-2004, CVE-2024-2398 Maintenance Incident: [SUSE:Maintenance:33125](https://smelt.suse.de/incident/33125/) Sources used: openSUSE Leap 15.4 (src): curl-8.0.1-150400.5.44.1 openSUSE Leap Micro 5.3 (src): curl-8.0.1-150400.5.44.1 openSUSE Leap Micro 5.4 (src): curl-8.0.1-150400.5.44.1 openSUSE Leap 15.5 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise High Performance Computing 15 SP4 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise Server 15 SP4 (src): curl-8.0.1-150400.5.44.1 SUSE Manager Server 4.3 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise Desktop 15 SP4 (src): curl-8.0.1-150400.5.44.1 SUSE Manager Retail Branch Server 4.3 (src): curl-8.0.1-150400.5.44.1 SUSE Manager Proxy 4.3 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise High Performance Computing 15 SP5 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise Server 15 SP5 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise Server for SAP Applications 15 SP5 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise Desktop 15 SP5 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise Micro 5.3 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise Micro 5.4 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise Micro 5.5 (src): curl-8.0.1-150400.5.44.1 Basesystem Module 15-SP5 (src): curl-8.0.1-150400.5.44.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:1150-1: An update that solves two vulnerabilities can now be installed. Category: security (moderate) Bug References: 1221665, 1221667 CVE References: CVE-2024-2004, CVE-2024-2398 Maintenance Incident: [SUSE:Maintenance:33126](https://smelt.suse.de/incident/33126/) Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): curl-8.0.1-11.86.2 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): curl-8.0.1-11.86.2 SUSE Linux Enterprise Server 12 SP5 (src): curl-8.0.1-11.86.2 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): curl-8.0.1-11.86.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:1151-2: An update that solves two vulnerabilities can now be installed. Category: security (moderate) Bug References: 1221665, 1221667 CVE References: CVE-2024-2004, CVE-2024-2398 Maintenance Incident: [SUSE:Maintenance:33125](https://smelt.suse.de/incident/33125/) Sources used: SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): curl-8.0.1-150400.5.44.1 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): curl-8.0.1-150400.5.44.1 SUSE Manager Proxy 4.3 (src): curl-8.0.1-150400.5.44.1 SUSE Manager Retail Branch Server 4.3 (src): curl-8.0.1-150400.5.44.1 SUSE Manager Server 4.3 (src): curl-8.0.1-150400.5.44.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.