SB2026050706 - SUSE update for curl



SB2026050706 - SUSE update for curl

Published: May 7, 2026

Security Bulletin ID SB2026050706
CSH Severity
Medium
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 vulnerabilities.


1) Authentication Bypass by Primary Weakness (CVE-ID: CVE-2026-1965)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to improper reuse of HTTP Negotiate connection. A remote attacker can bypass authentication and gain access to the target system.


2) Cleartext transmission of sensitive information (CVE-ID: CVE-2026-4873)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to connection reuse ignores TLS requirement. A remote attacker can gain access to sensitive data.


3) Authentication Bypass by Primary Weakness (CVE-ID: CVE-2026-5545)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to wrong reuse of HTTP Negotiate authentication connection. A remote attacker can execute arbitrary requests under the wrong user context.


4) Insufficiently protected credentials (CVE-ID: CVE-2026-6253)

The vulnerability allows a remote attacker to gain access to sensitive information on the system.

The vulnerability exists due to insufficiently protected credentials over redirect-to proxy. A remote attacker can gain access to sensitive information on the system.


5) Origin validation error (CVE-ID: CVE-2026-6276)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to origin validation error within stale custom cookie host. A remote attacker can gain access to sensitive information on the system.


6) Information disclosure (CVE-ID: CVE-2026-6429)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application when reused proxy connection. A remote attacker can gain unauthorized access to sensitive information on the system.


Remediation

Install update from vendor's website.