CVE Vulnerabilities

CVE-2024-2379

Improper Certificate Validation

Published: Mar 27, 2024 | Modified: Jul 30, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
5.4 LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Ubuntu
LOW

libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

Name Vendor Start Version End Version
Curl Haxx 8.6.0 (including) 8.6.0 (including)
JBoss Core Services for RHEL 8 RedHat jbcs-httpd24-curl-0:8.7.1-2.el8jbcs *
JBoss Core Services for RHEL 8 RedHat jbcs-httpd24-httpd-0:2.4.57-10.el8jbcs *
JBoss Core Services for RHEL 8 RedHat jbcs-httpd24-mod_http2-0:1.15.19-37.el8jbcs *
JBoss Core Services for RHEL 8 RedHat jbcs-httpd24-mod_jk-0:1.2.49-6.redhat_1.el8jbcs *
JBoss Core Services for RHEL 8 RedHat jbcs-httpd24-mod_md-1:2.4.24-6.el8jbcs *
JBoss Core Services for RHEL 8 RedHat jbcs-httpd24-mod_proxy_cluster-0:1.3.20-4.el8jbcs *
JBoss Core Services for RHEL 8 RedHat jbcs-httpd24-mod_security-0:2.9.3-36.el8jbcs *
JBoss Core Services for RHEL 8 RedHat jbcs-httpd24-nghttp2-0:1.43.0-13.el8jbcs *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-curl-0:8.7.1-2.el7jbcs *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-httpd-0:2.4.57-10.el7jbcs *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-mod_http2-0:1.15.19-37.el7jbcs *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-mod_jk-0:1.2.49-6.redhat_1.el7jbcs *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-mod_md-1:2.4.24-6.el7jbcs *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-mod_proxy_cluster-0:1.3.20-4.el7jbcs *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-mod_security-0:2.9.3-36.el7jbcs *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-nghttp2-0:1.43.0-13.el7jbcs *
Text-Only JBCS RedHat jbcs-httpd24-curl *
Curl Ubuntu upstream *

Potential Mitigations

References