curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (OCSP stapling) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/0xxx/CVE-2024-0853.json",
"unresolved_ranges": [
{
"source": "AFFECTED_FIELD",
"extracted_events": [
{
"last_affected": "8.5.0"
}
]
}
],
"cna_assigner": "curl"
}{
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "8.5.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:haxx:curl:8.5.0:*:*:*:*:*:*:*"
}