curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (OCSP stapling) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.
{ "binaries": [ { "binary_name": "curl", "binary_version": "8.5.0-2ubuntu2" }, { "binary_name": "libcurl3-gnutls", "binary_version": "8.5.0-2ubuntu2" }, { "binary_name": "libcurl4", "binary_version": "8.5.0-2ubuntu2" }, { "binary_name": "libcurl4-gnutls-dev", "binary_version": "8.5.0-2ubuntu2" }, { "binary_name": "libcurl4-openssl-dev", "binary_version": "8.5.0-2ubuntu2" } ], "priority_reason": "Upstream Curl developers have rated this as being low severity", "availability": "No subscription required" }