{"id":"AZL-62038","summary":"CVE-2025-5025 affecting package cmake for versions less than 3.30.3-6","details":"libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.","modified":"2026-04-01T05:19:58.275509Z","published":"2025-05-28T07:15:24Z","upstream":["CVE-2025-5025"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-5025"}],"affected":[{"package":{"name":"cmake","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/cmake"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.30.3-6"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-62038.json"}}],"schema_version":"1.7.5"}