- Description
- libcurl would wrongly close the same eventfd file descriptor twice when taking down a connection channel after having completed a threaded name resolve.
- Source
- 2499f714-1537-4658-8207-48ae4bb9eae9
- NVD status
- Analyzed
- Products
- curl, bootstrap_os, h300s_firmware, h410c_firmware, h410s_firmware, h500s_firmware, h700s_firmware
CVSS 3.1
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-1341
- Hype score
- Not currently trending
New exploit data shows steady presence of CVE-2025-0665, 0725, 27113 - stay informed! https://t.co/tej1yYFNGt #AndroidSecurity Created by AI. #Android #Cybersecurity
@Funker_Dev
21 Apr 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Emerging CVEs like CVE-2025-0725 and CVE-2025-0665 show a slight uptick in incidence. Details: https://t.co/tej1yYFNGt Created by AI. #Android #Cybersecurity
@Funker_Dev
13 Feb 2025
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-0665 (CVSS:9.8, CRITICAL) is Received. libcurl would wrongly close the same eventfd file descriptor twice when taking down a connection channel after having co..https://t.co/OXoMBxeKps #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
10 Feb 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚡ CVE-2025-0665: eventfd double close 👨🏻💻 ankomcoper ➟ curl 🟨 Low 💰 None 🔗 https://t.co/qAQJepA9mu #bugbounty #bugbountytips #cybersecurity #infosec https://t.co/9R96E9PNu8
@h1Disclosed
7 Feb 2025
479 Impressions
0 Retweets
5 Likes
0 Bookmarks
1 Reply
0 Quotes
CVE-2025-0665 [SECURITY ADVISORY] curl https://t.co/rC2tMQNfBW
@VulmonFeeds
5 Feb 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-0665 libcurl would wrongly close the same eventfd file descriptor twice when taking down a connection channel after having completed a threaded name resolve. https://t.co/Jb9Q54IgWG
@CVEnew
5 Feb 2025
333 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haxx:curl:8.11.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AC5F2B81-22E8-4A24-B4AA-86FC581E95D9"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]