Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-0853

Опубликовано: 03 фев. 2024
Источник: ubuntu
Приоритет: low
CVSS3: 5.3

Описание

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (OCSP stapling) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

released

8.5.0-2ubuntu2
esm-infra-legacy/trusty

not-affected

esm-infra/bionic

not-affected

esm-infra/focal

not-affected

esm-infra/xenial

not-affected

focal

not-affected

jammy

not-affected

lunar

not-affected

mantic

not-affected

8.2.1-1ubuntu3.2

Показывать по

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 3.8
redhat
около 2 лет назад

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

CVSS3: 5.3
nvd
около 2 лет назад

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

CVSS3: 5.3
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 5.3
debian
около 2 лет назад

curl inadvertently kept the SSL session ID for connections in its cach ...

CVSS3: 5.3
github
около 2 лет назад

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

5.3 Medium

CVSS3