CVE-2024-8096

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.

Open
LOW (3.5)
  • logo

    System detected CVE-2024-8096 with a risk of 3.45

  • logo

    System created a ticket for CVE-2024-8096

    Everything after this entry will be synced with the external system. The ticket can be found at https://github.com/l3montree-dev/devguard-action/issues/112

  • S

    Sebastian Kawelke updated the risk assessment from 3.45 to 3

    Confidentiality Requirement updated: high -> low, Availability Requirement updated: low -> high

  • S

    Sebastian Kawelke updated the risk assessment from 3.45 to 3

    Confidentiality Requirement updated: high -> low, Availability Requirement updated: low -> high

  • S

    Sebastian Kawelke updated the risk assessment from 3 to 3.45

    Confidentiality Requirement updated: low -> high

  • S

    Sebastian Kawelke updated the risk assessment from 3 to 3.45

    Confidentiality Requirement updated: low -> high

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System detected CVE-2024-8096 with a risk of 3.46

  • logo

    System updated the risk assessment from 3.46 to 3.45

    System recalculated raw risk assessment

Add a comment

Mark as False Positive
Last calculated at:

Affected component

debian/curl

Installed version:
7.88.1-10
Fixed in:
no patch available

Management decisions across the organization

Copyright © 2025 L3montree GmbH and the DevGuard Contributors. All rights reserved. Version 2ab7b793efd72421aea8c3a994ac60202bf1b3a5