Vulnerability CVE-2024-0853: Information

Description

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

Severity: MEDIUM (5.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Published: Feb. 3, 2024
Modified: May 3, 2024
Error type identifier: CWE-295

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
curlsisyphus8.6.0-alt18.7.1-alt2ALT-PU-2024-1624-2339478Fixed
curlsisyphus_e2k8.6.0-alt18.7.1-alt2ALT-PU-2024-1956-1-Fixed
curlsisyphus_riscv648.6.0-alt18.7.1-alt2ALT-PU-2024-3295-1-Fixed
curlsisyphus_loongarch648.6.0-alt18.7.1-alt2ALT-PU-2024-1708-1-Fixed
curlp108.6.0-alt18.7.1-alt2ALT-PU-2024-1813-3339529Fixed
curlp10_e2k8.6.0-alt18.7.1-alt2ALT-PU-2024-4215-1-Fixed
curlc10f18.6.0-alt18.6.0-alt1ALT-PU-2024-4175-2342987Fixed
curlc9f28.6.0-alt18.6.0-alt1ALT-PU-2024-2266-3340608Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:haxx:curl:8.5.0:*:*:*:*:*:*:*