<Vulnerability name="CVE-2026-5773">
    <DocumentDistribution xml:lang="en">Copyright © 2012 Red Hat, Inc. All rights reserved.</DocumentDistribution>
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2026-04-29T00:00:00</PublicDate>
    <Bugzilla id="2461201" url="https://bugzilla.redhat.com/show_bug.cgi?id=2461201" xml:lang="en:us">
curl: libcurl: Wrong file transfer due to incorrect SMB connection reuse
    </Bugzilla>
    <CVSS3 status="verified">
        <CVSS3BaseScore>6.5</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-1025</CWE>
    <Details xml:lang="en:us" source="Red Hat">
A flaw was found in libcurl. Due to a logical error in the connection reuse mechanism for SMB (Server Message Block) transfers, libcurl might reuse an existing SMB connection with a different share than intended. This vulnerability, categorized as CWE-488 (Exposure of Data Element to Wrong Session), could lead to the download of an incorrect file or the upload of a file to an unintended location when an application uses libcurl for SMB transfers.
    </Details>
    <Statement xml:lang="en:us">
This Moderate impact flaw in libcurl affects applications performing SMB transfers. A logical error in the SMB connection reuse mechanism can lead to unintended file downloads or uploads to incorrect locations. This impacts applications that rely on libcurl for secure and accurate SMB file operations.
    </Statement>
    <Mitigation xml:lang="en:us">
To mitigate this issue, avoid using SMB for transfers with libcurl. As SMB support is opt-in since curl 8.20.0 and SMBv1 is deprecated, ensuring SMB functionality is disabled or not utilized in applications leveraging libcurl will prevent exposure. If SMB is required, consider upgrading to curl 8.20.0 or later, which addresses this flaw by preventing SMB connection reuse.
    </Mitigation>
    <AffectedRelease cpe="cpe:/a:redhat:hummingbird:1">
        <ProductName>Red Hat Hardened Images</ProductName>
        <ReleaseDate>2026-05-02T00:00:00Z</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2026:12916">RHSA-2026:12916</Advisory>
        <Package name="curl-main">curl-main-8.20.0-0.1.hum1</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/a:redhat:confidential_compute_attestation:1">
        <ProductName>Confidential Compute Attestation</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>build-of-trustee/trustee-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:confidential_compute_attestation:1">
        <ProductName>Confidential Compute Attestation</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>confidential-compute-attestation-tech-preview/trustee-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:confidential_compute_attestation:1">
        <ProductName>Confidential Compute Attestation</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-sandboxed-containers/osc-operator-bundle</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:confidential_compute_attestation:1">
        <ProductName>Confidential Compute Attestation</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-sandboxed-containers/osc-podvm-builder-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:confidential_compute_attestation:1">
        <ProductName>Confidential Compute Attestation</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-sandboxed-containers/osc-podvm-payload-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:confidential_compute_attestation:1">
        <ProductName>Confidential Compute Attestation</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-sandboxed-containers/osc-rhel9-operator</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:logging:5">
        <ProductName>Logging Subsystem for Red Hat OpenShift</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-logging/cluster-logging-operator-bundle</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:logging:5">
        <ProductName>Logging Subsystem for Red Hat OpenShift</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-logging/cluster-logging-rhel9-operator</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:logging:5">
        <ProductName>Logging Subsystem for Red Hat OpenShift</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-logging/eventrouter-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:logging:5">
        <ProductName>Logging Subsystem for Red Hat OpenShift</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-logging/fluentd-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:logging:5">
        <ProductName>Logging Subsystem for Red Hat OpenShift</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-logging/log-file-metric-exporter-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:logging:5">
        <ProductName>Logging Subsystem for Red Hat OpenShift</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-logging/logging-view-plugin-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:logging:5">
        <ProductName>Logging Subsystem for Red Hat OpenShift</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>openshift-logging/vector-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>curl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>rust</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>s390utils</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>snphost</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>trustee</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>trustee-guest-components</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>curl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>curl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>curl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>curl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>rust</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>snphost</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>trustee-guest-components</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:enterprise_linux_ai:3">
        <ProductName>Red Hat Enterprise Linux AI (RHEL AI) 3</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>rust</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:hummingbird:1">
        <ProductName>Red Hat Hardened Images</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>rust</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_core_services:1">
        <ProductName>Red Hat JBoss Core Services</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>curl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:openshift:4">
        <ProductName>Red Hat OpenShift Container Platform 4</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>rhcos</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:openshift_devspaces:3">
        <ProductName>Red Hat OpenShift Dev Spaces</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>devspaces/code-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:trusted_profile_analyzer:2">
        <ProductName>Red Hat Trusted Profile Analyzer</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>rhtpa/rhtpa-trustification-service-rhel9</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2026-5773
https://nvd.nist.gov/vuln/detail/CVE-2026-5773
https://curl.se/docs/CVE-2026-5773.html
    </References>
</Vulnerability>