libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.
{ "package": "curl", "last_affected": "8.6.0", "award": { "currency": "USD", "amount": "540" }, "issue": "https://hackerone.com/reports/2410774", "URL": "https://curl.se/docs/CVE-2024-2379.json", "CWE": { "desc": "Improper Certificate Validation", "id": "CWE-295" }, "affects": "both", "severity": "Low", "www": "https://curl.se/docs/CVE-2024-2379.html" }