CVE-2020-8286 log

Source
Severity Medium
Remote Yes
Type Certificate verification bypass
Description
A security issue was found in curl versions 7.41.0 up to and including 7.73.0. libcurl offers "OCSP stapling" via the CURLOPT_SSL_VERIFYSTATUS option. When set, libcurl verifies the OCSP response that a server responds with as part of the TLS handshake. It then aborts the TLS negotiation if something is wrong with the response. The same feature can be enabled with --cert-status using the curl tool. As part of the OCSP response verification, a client should verify that the response is indeed set out for the correct certificate. This step was not performed by libcurl when built or told to use OpenSSL as TLS backend. This flaw would allow an attacker, who perhaps could have breached a TLS server, to provide a fraudulent OCSP response that would appear fine, instead of the real one. Like if the original certificate actually has been revoked.
Group Package Affected Fixed Severity Status Ticket
AVG-1337 curl 7.73.0-1 7.74.0-1 Medium Fixed
References
https://curl.se/docs/CVE-2020-8286.html
https://github.com/curl/curl/commit/d9d01672785b8ac04aab1abb6de95fe3072ae199