CVE-2024-2004
Publication date 27 March 2024
Last updated 30 May 2025
Ubuntu priority
Cvss 3 Severity Score
When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled. curl --proto -all,-http http://curl.se The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.
Read the notes from the security team
Why is this CVE low priority?
Upstream developers consider this a low severity issue
Status
Package | Ubuntu Release | Status |
---|---|---|
curl | 24.04 LTS noble |
Fixed 8.5.0-2ubuntu10.1
|
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
Notes
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | Required |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-6718-1
- curl vulnerabilities
- 27 March 2024
- USN-6718-3
- curl vulnerabilities
- 29 April 2024