{"id":"CVE-2025-14819","details":"When doing TLS related transfers with reused easy or multi handles and\naltering the  `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user's wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.","aliases":["CURL-CVE-2025-14819"],"modified":"2026-03-23T05:06:41.915202950Z","published":"2026-01-08T10:15:46.730Z","related":["MGASA-2026-0003","SUSE-SU-2026:0050-1","SUSE-SU-2026:0051-1","SUSE-SU-2026:0052-1","SUSE-SU-2026:0066-1","SUSE-SU-2026:0508-1","SUSE-SU-2026:20042-1","SUSE-SU-2026:20062-1","SUSE-SU-2026:20082-1","SUSE-SU-2026:20110-1","openSUSE-SU-2026:10017-1","openSUSE-SU-2026:20031-1"],"references":[{"type":"ADVISORY","url":"https://curl.se/docs/CVE-2025-14819.json"},{"type":"FIX","url":"https://curl.se/docs/CVE-2025-14819.html"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2026/01/07/5"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/curl/curl","events":[{"introduced":"c12fb3ddaf48e709a7a4deaa55ec485e4df163ee"},{"fixed":"2eebc58c4b8d68c98c8344381a9f6df4cca838fd"}],"database_specific":{"versions":[{"introduced":"7.87.0"},{"fixed":"8.18.0"}]}}],"versions":["curl-7_87_0","curl-7_88_0","curl-7_88_1","curl-8_0_0","curl-8_0_1","curl-8_10_0","curl-8_10_1","curl-8_11_0","curl-8_11_1","curl-8_12_0","curl-8_12_1","curl-8_13_0","curl-8_14_0","curl-8_14_1","curl-8_15_0","curl-8_16_0","curl-8_17_0","curl-8_1_0","curl-8_1_1","curl-8_1_2","curl-8_2_0","curl-8_2_1","curl-8_3_0","curl-8_4_0","curl-8_5_0","curl-8_6_0","curl-8_7_0","curl-8_7_1","curl-8_8_0","curl-8_9_0","curl-8_9_1","rc-8_18_0-1","rc-8_18_0-2","rc-8_18_0-3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-14819.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}