A Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Five years running.A Leader in the Gartner® Magic Quadrant™Read the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly ingest data from on-prem, cloud or hybrid environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Identity Security
    • Singularity Identity
      Identity Threat Detection and Response
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-class Expertise and Threat Intelligence.
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive solutions for seamless security operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your go-to source for our top partners in your region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-2398

CVE-2024-2398: Haxx Curl Information Disclosure Flaw

CVE-2024-2398 is an information disclosure vulnerability in Haxx Curl's HTTP/2 server push feature that causes memory leaks when header limits are exceeded. This article covers technical details, affected versions, and mitigation.

Published: January 28, 2026

CVE-2024-2398 Overview

CVE-2024-2398 is a memory leak vulnerability in libcurl that affects applications using HTTP/2 server push functionality. When an application enables HTTP/2 server push and the number of received headers for a push exceeds the maximum allowed limit of 1000 headers, libcurl aborts the server push operation. During this abort process, libcurl fails to properly free all previously allocated header memory, resulting in a memory leak. Critically, this error condition fails silently, making it difficult for applications to detect and respond to the issue.

Critical Impact

Memory leak vulnerability in libcurl's HTTP/2 server push handling can lead to resource exhaustion and potential denial of service conditions in affected applications. The silent failure nature makes detection particularly challenging.

Affected Products

  • Haxx curl
  • Apple macOS
  • Fedora Project Fedora (versions 39 and 40)
  • NetApp Active IQ Unified Manager
  • NetApp ONTAP Select Deploy Administration Utility
  • NetApp Brocade Fabric Operating System
  • NetApp Bootstrap OS
  • NetApp HCI Compute Node
  • NetApp H-Series Storage Systems (H300S, H410S, H500S, H610C, H610S, H615C, H700S)

Discovery Timeline

  • March 27, 2024 - CVE-2024-2398 published to NVD
  • July 30, 2025 - Last updated in NVD database

Technical Details for CVE-2024-2398

Vulnerability Analysis

This vulnerability is classified as CWE-772 (Missing Release of Resource after Effective Lifetime). The issue occurs within libcurl's HTTP/2 server push implementation, specifically when handling header data during push operations. When a malicious or misconfigured server sends more than 1000 headers in an HTTP/2 server push, libcurl correctly identifies this as an error condition and aborts the push. However, the abort code path contains a flaw where previously allocated memory for headers is not properly released before the function returns.

The vulnerability is particularly concerning because the memory leak occurs silently without generating any error messages or return codes that would alert the application to the issue. This means applications may continue operating normally while steadily consuming more memory, eventually leading to resource exhaustion.

Root Cause

The root cause is improper resource cleanup in libcurl's HTTP/2 server push abort handling code. When the header count exceeds 1000, the abort logic fails to iterate through and free all previously allocated header structures before returning from the function. This represents a classic resource management failure where an error handling path does not properly clean up resources that were allocated during normal operation.

Attack Vector

An attacker with network access can exploit this vulnerability by controlling or compromising an HTTP/2 server that communicates with a vulnerable libcurl client. The attack involves sending HTTP/2 server push responses containing more than 1000 headers. Each time the client processes such a malicious push, memory is leaked. By repeatedly triggering this condition, an attacker can cause gradual memory exhaustion on the client system.

The attack is particularly effective because:

  • It requires no authentication
  • It can be triggered remotely over the network
  • The victim application receives no indication of the ongoing attack
  • The memory leak accumulates with each malicious push attempt

The vulnerability was reported through the HackerOne Report #2402845 bug bounty program. For detailed technical information, refer to the CURL CVE-2024-2398 Documentation.

Detection Methods for CVE-2024-2398

Indicators of Compromise

  • Gradual increase in memory consumption by applications using libcurl with HTTP/2 server push enabled
  • Unusual HTTP/2 server push traffic with abnormally high header counts from external servers
  • Application performance degradation or crashes due to memory exhaustion
  • Connections to suspicious HTTP/2 servers that consistently trigger push operations

Detection Strategies

  • Monitor memory usage patterns of applications that utilize libcurl for HTTP/2 communications
  • Implement network traffic analysis to detect HTTP/2 push responses with excessive header counts (>1000)
  • Deploy endpoint detection rules to identify processes consuming memory at abnormal rates without corresponding activity increases
  • Use application performance monitoring to track libcurl-based applications for memory leak indicators

Monitoring Recommendations

  • Enable detailed logging for HTTP/2 connections and server push operations where feasible
  • Implement memory usage thresholds and alerts for critical applications using libcurl
  • Monitor network traffic for patterns consistent with HTTP/2 server push abuse
  • Regularly audit systems for outdated libcurl versions using software composition analysis tools

How to Mitigate CVE-2024-2398

Immediate Actions Required

  • Update libcurl to the latest patched version immediately
  • If unable to patch immediately, disable HTTP/2 server push functionality using CURLMOPT_PUSHFUNCTION set to return CURL_PUSH_DENY
  • Audit all applications and systems that incorporate libcurl for HTTP/2 functionality
  • Implement memory monitoring for applications using vulnerable versions until patches can be applied

Patch Information

Security patches are available from multiple vendors. The curl project has released fixes as documented in the CURL CVE-2024-2398 Documentation. Apple has addressed this vulnerability in macOS updates detailed in Apple Support Document HT214118, HT214119, and HT214120. Fedora users should apply updates as announced in the Fedora Package Announcement. NetApp customers should refer to NetApp Security Advisory NTAP-20240503-0009.

Workarounds

  • Disable HTTP/2 server push by configuring the application to reject all push promises
  • Implement application-level memory monitoring and automatic restarts when thresholds are exceeded
  • Use network-level filtering to block or rate-limit HTTP/2 push responses from untrusted servers
  • Consider downgrading to HTTP/1.1 for connections to untrusted servers until patching is complete
bash
# Example: Disable HTTP/2 server push in curl command line
curl --http2 --no-push https://example.com/

# For applications using libcurl, set push callback to deny all pushes:
# curl_multi_setopt(multi_handle, CURLMOPT_PUSHFUNCTION, deny_push_callback);

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechHaxx Curl

  • SeverityHIGH

  • CVSS Score8.6

  • EPSS Probability1.96%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-772
  • Technical References
  • Full Disclosure Post July 18

  • Full Disclosure Post July 19

  • Full Disclosure Post July 20

  • Openwall OSS-Security Post March 27

  • HackerOne Report #2402845

  • Fedora Package Announcement March Message

  • Fedora Package Announcement April Message

  • NetApp Security Advisory NTAP-20240503-0009
  • Vendor Resources
  • CURL CVE-2024-2398 Documentation

  • CURL CVE-2024-2398 JSON Data

  • Apple Support Document HT214118

  • Apple Support Document HT214119

  • Apple Support Document HT214120
  • Related CVEs
  • CVE-2025-15224

  • CVE-2025-15079

  • CVE-2025-14819

  • CVE-2025-14524

  • CVE-2025-14017

  • CVE-2025-13034

  • CVE-2025-5399
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use