Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-0853

Опубликовано: 03 фев. 2024
Источник: debian
EPSS Низкий

Описание

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
curlfixed8.6.0-1package
curlnot-affectedbookwormpackage
curlnot-affectedbullseyepackage
curlnot-affectedbusterpackage

Примечания

  • https://curl.se/docs/CVE-2024-0853.html

  • Introduced by: https://github.com/curl/curl/commit/395365ad2d9a6c3f1a35d5e268a6af2824129832 (curl-8_5_0)

  • Fixed by: https://github.com/curl/curl/commit/c28e9478cb2548848eca9b765d0d409bfb18668c (curl-8_6_0)

EPSS

Процентиль: 37%
0.00156
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 2 лет назад

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

CVSS3: 3.8
redhat
около 2 лет назад

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

CVSS3: 5.3
nvd
около 2 лет назад

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

CVSS3: 5.3
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 5.3
github
около 2 лет назад

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

EPSS

Процентиль: 37%
0.00156
Низкий