When doing TLS related transfers with reused easy or multi handles and
altering the CURLSSLOPT_NO_PARTIALCHAIN option, libcurl could accidentally
reuse a CA store cached in memory for which the partial chain option was
reversed. Contrary to the user's wishes and expectations. This could make
libcurl find and accept a trust chain that it otherwise would not.
{
"license": "CC-BY-4.0",
"sources": [
{
"published": "2026-01-08T10:15:46.730Z",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-14819",
"database_specific": {
"status": "Analyzed"
},
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14819",
"id": "CVE-2025-14819",
"modified": "2026-01-20T14:51:26.263Z",
"imported": "2026-05-02T08:39:50.022Z"
},
{
"html_url": "https://github.com/advisories/GHSA-vqhr-m87q-9jqh",
"imported": "2026-05-02T08:42:42.532Z",
"id": "GHSA-vqhr-m87q-9jqh",
"url": "https://api.github.com/advisories/GHSA-vqhr-m87q-9jqh",
"modified": "2026-01-08T15:32:29Z",
"published": "2026-01-08T12:30:29Z"
},
{
"imported": "2026-05-02T08:41:04.784Z",
"published": "2026-01-08T10:07:54Z",
"url": "https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2026-1566",
"id": "EUVD-2026-1566",
"modified": "2026-01-08T15:02:04Z",
"html_url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-1566"
}
]
}