curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (OCSP stapling) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check. This issue is limited to curl built to use OpenSSL and when using TLS 1.2 only and not TLS 1.3. The issue is fixed upstream in curl 8.6.0. References: https://curl.se/docs/CVE-2024-0853.html https://www.openwall.com/lists/oss-security/2024/01/31/1 Upstream fix: https://github.com/curl/curl/commit/c28e9478cb2548848ec