curl inadvertently kept the SSL session ID for...
Moderate severity
Unreviewed
Published
Feb 3, 2024
to the GitHub Advisory Database
•
Updated May 3, 2024
Description
Published by the National Vulnerability Database
Feb 3, 2024
Published to the GitHub Advisory Database
Feb 3, 2024
Last updated
May 3, 2024
curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (OCSP stapling) test failed. A subsequent transfer to
the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.
References