curl is vulnerable to authorization bypass. The vulnerability is present only if OpenSSL is the designated TLS backend. OCSP stapling is not enabled by default by libcurl, it needs to be explicitly enabled by the application to get used.
seclists.org/fulldisclosure/2021/Apr/50
seclists.org/fulldisclosure/2021/Apr/51
seclists.org/fulldisclosure/2021/Apr/54
cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf
cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
curl.se/docs/CVE-2020-8286.html
git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2020-8286
hackerone.com/reports/1048457
lists.debian.org/debian-lts-announce/2020/12/msg00029.html
lists.fedoraproject.org/archives/list/[email protected]/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
lists.fedoraproject.org/archives/list/[email protected]/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
security.gentoo.org/glsa/202012-14
security.netapp.com/advisory/ntap-20210122-0007/
support.apple.com/kb/HT212325
support.apple.com/kb/HT212326
support.apple.com/kb/HT212327
www.debian.org/security/2021/dsa-4881
www.oracle.com//security-alerts/cpujul2021.html
www.oracle.com/security-alerts/cpuApr2021.html
www.oracle.com/security-alerts/cpuapr2022.html