First published: Wed Jan 31 2024(Updated: )
curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.
Credit: 2499f714-1537-4658-8207-48ae4bb9eae9
Affected Software | Affected Version | How to fix |
---|---|---|
=8.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.