We have published a blog post on the latest curl vulnerabilities:
These vulnerabilities requires a very specific set of conditions to be exploited, such as the use of a SOCKS5 proxy or local access to the machine.
Agent
N/A
Platform
Using Lacework/Operationalizing
Cloud
N/A