curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (OCSP stapling) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.
{ "award": { "amount": "540", "currency": "USD" }, "last_affected": "8.5.0", "affects": "both", "CWE": { "id": "CWE-299", "desc": "Improper Check for Certificate Revocation" }, "severity": "Low", "URL": "https://curl.se/docs/CVE-2024-0853.json", "issue": "https://hackerone.com/reports/2298922", "www": "https://curl.se/docs/CVE-2024-0853.html", "package": "curl" }