{"id":"JLSEC-2026-415","summary":"libcurl skips the certificate verification for a QUIC connection under certain conditions, when...","details":"libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.","modified":"2026-05-04T13:32:46.959600857Z","published":"2026-05-04T13:12:06.605Z","upstream":["CVE-2024-2379","EUVD-2024-27332","GHSA-wr4c-gwg7-p734"],"database_specific":{"license":"CC-BY-4.0","sources":[{"modified":"2025-07-30T19:42:09.087Z","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2024-2379","published":"2024-03-27T08:15:41.230Z","id":"CVE-2024-2379","imported":"2026-05-02T08:39:48.299Z","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-2379","database_specific":{"status":"Analyzed"}},{"modified":"2025-07-30T21:32:35Z","html_url":"https://github.com/advisories/GHSA-wr4c-gwg7-p734","published":"2024-03-27T09:30:41Z","id":"GHSA-wr4c-gwg7-p734","imported":"2026-05-02T08:42:44.259Z","url":"https://api.github.com/advisories/GHSA-wr4c-gwg7-p734"},{"modified":"2025-02-13T17:39:51Z","html_url":"https://euvd.enisa.europa.eu/vulnerability/EUVD-2024-27332","published":"2024-03-27T07:56:41Z","url":"https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2024-27332","imported":"2026-05-02T08:42:31.084Z","id":"EUVD-2024-27332"}]},"references":[{"type":"WEB","url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2024/Jul/19"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2024/Jul/20"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/03/27/2"},{"type":"WEB","url":"https://curl.se/docs/CVE-2024-2379.html"},{"type":"WEB","url":"https://curl.se/docs/CVE-2024-2379.json"},{"type":"WEB","url":"https://github.com/advisories/GHSA-wr4c-gwg7-p734"},{"type":"WEB","url":"https://hackerone.com/reports/2410774"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-2379"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20240531-0001"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20240531-0001/"},{"type":"WEB","url":"https://support.apple.com/kb/HT214118"},{"type":"WEB","url":"https://support.apple.com/kb/HT214119"},{"type":"WEB","url":"https://support.apple.com/kb/HT214120"}],"affected":[{"package":{"name":"CURL_jll","ecosystem":"Julia","purl":"pkg:julia/CURL_jll?uuid=b21e61f3-bafc-59ac-ab14-4c5c62d6588d"},"ranges":[{"type":"SEMVER","events":[{"introduced":"8.6.0+0"},{"fixed":"8.9.0+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-415.json"}},{"package":{"name":"LibCURL_jll","ecosystem":"Julia","purl":"pkg:julia/LibCURL_jll?uuid=deac9b47-8bc7-5906-a0fe-35ac56dc84c0"},"ranges":[{"type":"SEMVER","events":[{"introduced":"8.6.0+0"},{"fixed":"8.7.1+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-415.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}]}