Date: Wed, 28 Feb 2024 00:53:15 GMT From: Yasuhiro Kimura <yasu@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 16f370e33f0c - main - security/vuxml: Document OCSP verification bypass vulnerability in curl Message-ID: <202402280053.41S0rF7K014957@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by yasu: URL: https://cgit.FreeBSD.org/ports/commit/?id=16f370e33f0cdd303de5a28f598d67b40091e307 commit 16f370e33f0cdd303de5a28f598d67b40091e307 Author: Yasuhiro Kimura <yasu@FreeBSD.org> AuthorDate: 2024-02-08 07:45:33 +0000 Commit: Yasuhiro Kimura <yasu@FreeBSD.org> CommitDate: 2024-02-28 00:50:29 +0000 security/vuxml: Document OCSP verification bypass vulnerability in curl PR: 276879 --- security/vuxml/vuln/2024.xml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 58b2218ecd4e..d425738ea7e7 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,35 @@ + <vuln vid="02e33cd1-c655-11ee-8613-08002784c58d"> + <topic>curl -- OCSP verification bypass with TLS session reuse</topic> + <affects> + <package> + <name>curl</name> + <range><lt>8.6.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Hiroki Kurosawa reports:</p> + <blockquote cite="https://curl.se/docs/CVE-2024-0853.html"> + <p> + curl inadvertently kept the SSL session ID for connections + in its cache even when the verify status (OCSP stapling) + test failed. A subsequent transfer to the same hostname + could then succeed if the session ID cache was still + fresh, which then skipped the verify status check. + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2024-0853</cvename> + <url>https://curl.se/docs/CVE-2024-0853.html</url> + </references> + <dates> + <discovery>2024-01-31</discovery> + <entry>2024-02-28</entry> + </dates> + </vuln> + <vuln vid="5ecfb588-d2f4-11ee-ad82-dbdfaa8acfc2"> <topic>gitea -- Fix XSS vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202402280053.41S0rF7K014957>