View | Details | Raw Unified | Return to bug 276879 | Differences between
and this patch

Collapse All | Expand All

(-)b/security/vuxml/vuln/2024.xml (-1 / +32 lines)
Lines 1-3 Link Here
1
  <vuln vid="02e33cd1-c655-11ee-8613-08002784c58d">
2
    <topic>curl -- OCSP verification bypass with TLS session reuse</topic>
3
    <affects>
4
      <package>
5
	<name>curl</name>
6
	<range><lt>8.6.0</lt></range>
7
      </package>
8
    </affects>
9
    <description>
10
	<body xmlns="http://www.w3.org/1999/xhtml">
11
	<p>Hiroki Kurosawa reports:</p>
12
	<blockquote cite="https://curl.se/docs/CVE-2024-0853.html">
13
	  <p>
14
	    curl inadvertently kept the SSL session ID for connections
15
	    in its cache even when the verify status (OCSP stapling)
16
	    test failed. A subsequent transfer to the same hostname
17
	    could then succeed if the session ID cache was still
18
	    fresh, which then skipped the verify status check.
19
	  </p>
20
	</blockquote>
21
	</body>
22
    </description>
23
    <references>
24
      <cvename>CVE-2024-0853</cvename>
25
      <url>https://curl.se/docs/CVE-2024-0853.html</url>
26
    </references>
27
    <dates>
28
      <discovery>2024-01-31</discovery>
29
      <entry>2024-02-08</entry>
30
    </dates>
31
  </vuln>
32
1
  <vuln vid="68ae70c5-c5e5-11ee-9768-08002784c58d">
33
  <vuln vid="68ae70c5-c5e5-11ee-9768-08002784c58d">
2
    <topic>clamav -- Multiple vulnerabilities</topic>
34
    <topic>clamav -- Multiple vulnerabilities</topic>
3
    <affects>
35
    <affects>
4
- 

Return to bug 276879