Lines 1-3
Link Here
|
|
|
1 |
<vuln vid="02e33cd1-c655-11ee-8613-08002784c58d"> |
2 |
<topic>curl -- OCSP verification bypass with TLS session reuse</topic> |
3 |
<affects> |
4 |
<package> |
5 |
<name>curl</name> |
6 |
<range><lt>8.6.0</lt></range> |
7 |
</package> |
8 |
</affects> |
9 |
<description> |
10 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
11 |
<p>Hiroki Kurosawa reports:</p> |
12 |
<blockquote cite="https://curl.se/docs/CVE-2024-0853.html"> |
13 |
<p> |
14 |
curl inadvertently kept the SSL session ID for connections |
15 |
in its cache even when the verify status (OCSP stapling) |
16 |
test failed. A subsequent transfer to the same hostname |
17 |
could then succeed if the session ID cache was still |
18 |
fresh, which then skipped the verify status check. |
19 |
</p> |
20 |
</blockquote> |
21 |
</body> |
22 |
</description> |
23 |
<references> |
24 |
<cvename>CVE-2024-0853</cvename> |
25 |
<url>https://curl.se/docs/CVE-2024-0853.html</url> |
26 |
</references> |
27 |
<dates> |
28 |
<discovery>2024-01-31</discovery> |
29 |
<entry>2024-02-08</entry> |
30 |
</dates> |
31 |
</vuln> |
32 |
|
1 |
<vuln vid="68ae70c5-c5e5-11ee-9768-08002784c58d"> |
33 |
<vuln vid="68ae70c5-c5e5-11ee-9768-08002784c58d"> |
2 |
<topic>clamav -- Multiple vulnerabilities</topic> |
34 |
<topic>clamav -- Multiple vulnerabilities</topic> |
3 |
<affects> |
35 |
<affects> |
4 |
- |
|
|