<Vulnerability name="CVE-2026-4873">
    <DocumentDistribution xml:lang="en">Copyright © 2012 Red Hat, Inc. All rights reserved.</DocumentDistribution>
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2026-04-29T00:00:00</PublicDate>
    <Bugzilla id="2461200" url="https://bugzilla.redhat.com/show_bug.cgi?id=2461200" xml:lang="en:us">
curl: curl: Information disclosure due to incorrect TLS connection reuse
    </Bugzilla>
    <CVSS3 status="verified">
        <CVSS3BaseScore>5.3</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-319</CWE>
    <Details xml:lang="en:us" source="Red Hat">
A flaw was found in curl. A remote attacker could exploit this by initiating an unencrypted connection (via IMAP, SMTP, or POP3) and then making a subsequent request to the same host that requires Transport Layer Security (TLS). Due to incorrect connection reuse, the subsequent request would bypass the TLS requirement, leading to the transmission of sensitive information in cleartext. This vulnerability, categorized as Cleartext Transmission of Sensitive Information (CWE-319), results in information disclosure.
    </Details>
    <Statement xml:lang="en:us">
Moderate: This flaw in curl allows for information disclosure when an unencrypted connection is incorrectly reused for a subsequent request that expects TLS. This can lead to the cleartext transmission of sensitive data, potentially affecting Red Hat products that utilize curl for IMAP, SMTP, or POP3 connections where connection reuse is enabled.
    </Statement>
    <Mitigation xml:lang="en:us">
To mitigate this issue, avoid using clear-text IMAP, POP3, or SMTP transfers with curl. Ensure that all connections for these protocols are initiated with TLS from the outset to prevent the reuse of unencrypted connections.
    </Mitigation>
    <AffectedRelease cpe="cpe:/a:redhat:hummingbird:1">
        <ProductName>Red Hat Hardened Images</ProductName>
        <ReleaseDate>2026-05-02T00:00:00Z</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2026:12916">RHSA-2026:12916</Advisory>
        <Package name="curl-main">curl-main-8.20.0-0.1.hum1</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/a:redhat:confidential_compute_attestation:1">
        <ProductName>Confidential Compute Attestation</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>build-of-trustee/trustee-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:confidential_compute_attestation:1">
        <ProductName>Confidential Compute Attestation</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>confidential-compute-attestation-tech-preview/trustee-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:confidential_compute_attestation:1">
        <ProductName>Confidential Compute Attestation</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-sandboxed-containers/osc-operator-bundle</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:confidential_compute_attestation:1">
        <ProductName>Confidential Compute Attestation</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-sandboxed-containers/osc-podvm-builder-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:confidential_compute_attestation:1">
        <ProductName>Confidential Compute Attestation</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-sandboxed-containers/osc-podvm-payload-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:confidential_compute_attestation:1">
        <ProductName>Confidential Compute Attestation</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-sandboxed-containers/osc-rhel9-operator</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:logging:5">
        <ProductName>Logging Subsystem for Red Hat OpenShift</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-logging/cluster-logging-operator-bundle</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:logging:5">
        <ProductName>Logging Subsystem for Red Hat OpenShift</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-logging/cluster-logging-rhel9-operator</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:logging:5">
        <ProductName>Logging Subsystem for Red Hat OpenShift</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-logging/eventrouter-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:logging:5">
        <ProductName>Logging Subsystem for Red Hat OpenShift</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-logging/fluentd-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:logging:5">
        <ProductName>Logging Subsystem for Red Hat OpenShift</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-logging/log-file-metric-exporter-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:logging:5">
        <ProductName>Logging Subsystem for Red Hat OpenShift</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-logging/logging-view-plugin-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:logging:5">
        <ProductName>Logging Subsystem for Red Hat OpenShift</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-logging/vector-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>curl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>rust</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>s390utils</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>snphost</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>trustee</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>trustee-guest-components</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>curl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>curl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>curl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>curl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>rust</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>snphost</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>trustee-guest-components</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:enterprise_linux_ai:3">
        <ProductName>Red Hat Enterprise Linux AI (RHEL AI) 3</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>rust</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:hummingbird:1">
        <ProductName>Red Hat Hardened Images</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>rust</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_core_services:1">
        <ProductName>Red Hat JBoss Core Services</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>curl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:openshift:4">
        <ProductName>Red Hat OpenShift Container Platform 4</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>rhcos</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:openshift_devspaces:3">
        <ProductName>Red Hat OpenShift Dev Spaces</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>devspaces/code-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:trusted_profile_analyzer:2">
        <ProductName>Red Hat Trusted Profile Analyzer</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>rhtpa/rhtpa-trustification-service-rhel9</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2026-4873
https://nvd.nist.gov/vuln/detail/CVE-2026-4873
https://curl.se/docs/CVE-2026-4873.html
    </References>
</Vulnerability>