Anolis OS update for curl



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-2004
CWE-ID CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
Anolis OS
Operating systems & Components / Operating system

curl-doc
Operating systems & Components / Operating system package or component

libcurl-minimal
Operating systems & Components / Operating system package or component

libcurl-devel
Operating systems & Components / Operating system package or component

libcurl
Operating systems & Components / Operating system package or component

curl-minimal
Operating systems & Components / Operating system package or component

curl
Operating systems & Components / Operating system package or component

Vendor OpenAnolis

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Input validation error

EUVDB-ID: #VU87846

Risk: Low

CVSSv4.0: 0.2 [CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-2004

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to an error when a protocol selection parameter option disables all protocols without adding any. As a result, the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 23

curl-doc: before 8.4.0-6

libcurl-minimal: before 8.4.0-6

libcurl-devel: before 8.4.0-6

libcurl: before 8.4.0-6

curl-minimal: before 8.4.0-6

curl: before 8.4.0-6

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2025:0110


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###