MGASA-2024-0099

Source
https://advisories.mageia.org/MGASA-2024-0099.html
Import Source
https://advisories.mageia.org/MGASA-2024-0099.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0099
Related
Published
2024-03-29T03:49:09Z
Modified
2024-03-29T03:35:41Z
Summary
Updated curl packages fix security vulnerabilities
Details

CVE-2024-2004: Usage of disabled protocol If all protocols are disabled at run-time with none being added, curl/libcurl would still allow communication with the default set of allowed protocols, including some that are unencrypted. CVE-2024-2398: HTTP/2 push headers memory-leak A memory leak could occur when an application enabled HTTP/2 server push and the server sent a large number of headers.

References
Credits

Affected packages

Mageia:9 / curl

Package

Name
curl
Purl
pkg:rpm/mageia/curl?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.88.1-4.3.mga9

Ecosystem specific

{
    "section": "core"
}