libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.
{
"license": "CC-BY-4.0",
"sources": [
{
"modified": "2025-07-30T19:42:09.087Z",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-2379",
"id": "CVE-2024-2379",
"published": "2024-03-27T08:15:41.230Z",
"imported": "2026-05-02T08:39:48.299Z",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2379",
"database_specific": {
"status": "Analyzed"
}
},
{
"modified": "2025-07-30T21:32:35Z",
"url": "https://api.github.com/advisories/GHSA-wr4c-gwg7-p734",
"id": "GHSA-wr4c-gwg7-p734",
"published": "2024-03-27T09:30:41Z",
"imported": "2026-05-02T08:42:44.259Z",
"html_url": "https://github.com/advisories/GHSA-wr4c-gwg7-p734"
},
{
"url": "https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2024-27332",
"modified": "2025-02-13T17:39:51Z",
"published": "2024-03-27T07:56:41Z",
"id": "EUVD-2024-27332",
"imported": "2026-05-02T08:42:31.084Z",
"html_url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2024-27332"
}
]
}