<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for curl is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS,openEuler-24.03-LTS-SP1,openEuler-24.03-LTS-SP2,openEuler-24.03-LTS-SP3</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-1704</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-03-20</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-03-20</InitialReleaseDate>
		<CurrentReleaseDate>2026-03-20</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-03-20</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">curl security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for curl is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS,openEuler-24.03-LTS-SP1,openEuler-24.03-LTS-SP2,openEuler-24.03-LTS-SP3</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">cURL is a computer software project providing a library (libcurl) and command-line tool (curl) for transferring data using various protocols.

Security Fix(es):

libcurl can in some circumstances reuse the wrong connection when asked to do
an Negotiate-authenticated HTTP or HTTPS request.

libcurl features a pool of recent connections so that subsequent requests can
reuse an existing connection to avoid overhead.

When reusing a connection a range of criterion must first be met. Due to a
logical error in the code, a request that was issued by an application could
wrongfully reuse an existing connection to the same server that was
authenticated using different credentials. One underlying reason being that
Negotiate sometimes authenticates *connections* and not *requests*, contrary
to how HTTP is designed to work.

An application that allows Negotiate authentication to a server (that responds
wanting Negotiate) with `user1:password1` and then does another operation to
the same server also using Negotiate but with `user2:password2` (while the
previous connection is still alive) - the second request wrongly reused the
same connection and since it then sees that the Negotiate negotiation is
already made, it just sends the request over that connection thinking it uses
the user2 credentials when it is in fact still using the connection
authenticated for user1...

The set of authentication methods to use is set with  `CURLOPT_HTTPAUTH`.

Applications can disable libcurl&apos;s reuse of connections and thus mitigate this
problem, by using one of the following libcurl options to alter how
connections are or are not reused: `CURLOPT_FRESH_CONNECT`,
`CURLOPT_MAXCONNECTS` and `CURLMOPT_MAX_HOST_CONNECTIONS` (if using the
curl_multi API).(CVE-2026-1965)

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer
performs a redirect to a second URL, curl could leak that token to the second
hostname under some circumstances.

If the hostname that the first request is redirected to has information in the
used .netrc file, with either of the `machine` or `default` keywords, curl
would pass on the bearer token set for the first host also to the second one.(CVE-2026-3783)

curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a
server, even if the new request uses different credentials for the HTTP proxy.
The proper behavior is to create or use a separate connection.(CVE-2026-3784)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for curl is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS,openEuler-24.03-LTS-SP1,openEuler-24.03-LTS-SP2,openEuler-24.03-LTS-SP3.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">curl</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1704</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-1965</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-3783</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-3784</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-1965</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-3783</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-3784</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openEuler-24.03-LTS-SP1</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS-SP2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openEuler-24.03-LTS-SP2</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openEuler-24.03-LTS-SP3</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="curl-7.71.1-47" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">curl-7.71.1-47.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-debuginfo-7.71.1-47" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">curl-debuginfo-7.71.1-47.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-debugsource-7.71.1-47" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">curl-debugsource-7.71.1-47.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-7.71.1-47" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libcurl-7.71.1-47.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-devel-7.71.1-47" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libcurl-devel-7.71.1-47.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-7.79.1-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">curl-7.79.1-48.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-debuginfo-7.79.1-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">curl-debuginfo-7.79.1-48.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-debugsource-7.79.1-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">curl-debugsource-7.79.1-48.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-7.79.1-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libcurl-7.79.1-48.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-devel-7.79.1-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libcurl-devel-7.79.1-48.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">curl-8.4.0-28.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-debuginfo-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">curl-debuginfo-8.4.0-28.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-debugsource-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">curl-debugsource-8.4.0-28.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libcurl-8.4.0-28.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-devel-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libcurl-devel-8.4.0-28.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">curl-8.4.0-28.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-debuginfo-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">curl-debuginfo-8.4.0-28.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-debugsource-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">curl-debugsource-8.4.0-28.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libcurl-8.4.0-28.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-devel-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libcurl-devel-8.4.0-28.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">curl-8.4.0-28.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-debuginfo-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">curl-debuginfo-8.4.0-28.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-debugsource-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">curl-debugsource-8.4.0-28.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">libcurl-8.4.0-28.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-devel-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">libcurl-devel-8.4.0-28.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">curl-8.4.0-28.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-debuginfo-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">curl-debuginfo-8.4.0-28.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="curl-debugsource-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">curl-debugsource-8.4.0-28.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">libcurl-8.4.0-28.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-devel-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">libcurl-devel-8.4.0-28.oe2403sp3.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="curl-7.71.1-47" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">curl-7.71.1-47.oe2003sp4.src.rpm</FullProductName>
			<FullProductName ProductID="curl-7.79.1-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">curl-7.79.1-48.oe2203sp4.src.rpm</FullProductName>
			<FullProductName ProductID="curl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">curl-8.4.0-28.oe2403.src.rpm</FullProductName>
			<FullProductName ProductID="curl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">curl-8.4.0-28.oe2403sp1.src.rpm</FullProductName>
			<FullProductName ProductID="curl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">curl-8.4.0-28.oe2403sp2.src.rpm</FullProductName>
			<FullProductName ProductID="curl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">curl-8.4.0-28.oe2403sp3.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="curl-7.71.1-47" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">curl-7.71.1-47.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-debuginfo-7.71.1-47" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">curl-debuginfo-7.71.1-47.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-debugsource-7.71.1-47" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">curl-debugsource-7.71.1-47.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-7.71.1-47" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libcurl-7.71.1-47.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-devel-7.71.1-47" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libcurl-devel-7.71.1-47.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-7.79.1-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">curl-7.79.1-48.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-debuginfo-7.79.1-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">curl-debuginfo-7.79.1-48.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-debugsource-7.79.1-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">curl-debugsource-7.79.1-48.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-7.79.1-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libcurl-7.79.1-48.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-devel-7.79.1-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libcurl-devel-7.79.1-48.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">curl-8.4.0-28.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-debuginfo-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">curl-debuginfo-8.4.0-28.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-debugsource-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">curl-debugsource-8.4.0-28.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libcurl-8.4.0-28.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-devel-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libcurl-devel-8.4.0-28.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">curl-8.4.0-28.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-debuginfo-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">curl-debuginfo-8.4.0-28.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-debugsource-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">curl-debugsource-8.4.0-28.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libcurl-8.4.0-28.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-devel-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libcurl-devel-8.4.0-28.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">curl-8.4.0-28.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-debuginfo-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">curl-debuginfo-8.4.0-28.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-debugsource-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">curl-debugsource-8.4.0-28.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">libcurl-8.4.0-28.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-devel-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">libcurl-devel-8.4.0-28.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">curl-8.4.0-28.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-debuginfo-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">curl-debuginfo-8.4.0-28.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="curl-debugsource-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">curl-debugsource-8.4.0-28.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">libcurl-8.4.0-28.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libcurl-devel-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">libcurl-devel-8.4.0-28.oe2403sp3.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="curl-help-7.71.1-47" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">curl-help-7.71.1-47.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="curl-help-7.79.1-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">curl-help-7.79.1-48.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="curl-help-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">curl-help-8.4.0-28.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="curl-help-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">curl-help-8.4.0-28.oe2403sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="curl-help-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">curl-help-8.4.0-28.oe2403sp2.noarch.rpm</FullProductName>
			<FullProductName ProductID="curl-help-8.4.0-28" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">curl-help-8.4.0-28.oe2403sp3.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libcurl can in some circumstances reuse the wrong connection when asked to do
an Negotiate-authenticated HTTP or HTTPS request.

libcurl features a pool of recent connections so that subsequent requests can
reuse an existing connection to avoid overhead.

When reusing a connection a range of criterion must first be met. Due to a
logical error in the code, a request that was issued by an application could
wrongfully reuse an existing connection to the same server that was
authenticated using different credentials. One underlying reason being that
Negotiate sometimes authenticates *connections* and not *requests*, contrary
to how HTTP is designed to work.

An application that allows Negotiate authentication to a server (that responds
wanting Negotiate) with `user1:password1` and then does another operation to
the same server also using Negotiate but with `user2:password2` (while the
previous connection is still alive) - the second request wrongly reused the
same connection and since it then sees that the Negotiate negotiation is
already made, it just sends the request over that connection thinking it uses
the user2 credentials when it is in fact still using the connection
authenticated for user1...

The set of authentication methods to use is set with  `CURLOPT_HTTPAUTH`.

Applications can disable libcurl&apos;s reuse of connections and thus mitigate this
problem, by using one of the following libcurl options to alter how
connections are or are not reused: `CURLOPT_FRESH_CONNECT`,
`CURLOPT_MAXCONNECTS` and `CURLMOPT_MAX_HOST_CONNECTIONS` (if using the
curl_multi API).</Note>
		</Notes>
		<ReleaseDate>2026-03-20</ReleaseDate>
		<CVE>CVE-2026-1965</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>curl security update</Description>
				<DATE>2026-03-20</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1704</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer
performs a redirect to a second URL, curl could leak that token to the second
hostname under some circumstances.

If the hostname that the first request is redirected to has information in the
used .netrc file, with either of the `machine` or `default` keywords, curl
would pass on the bearer token set for the first host also to the second one.</Note>
		</Notes>
		<ReleaseDate>2026-03-20</ReleaseDate>
		<CVE>CVE-2026-3783</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.3</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>curl security update</Description>
				<DATE>2026-03-20</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1704</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a
server, even if the new request uses different credentials for the HTTP proxy.
The proper behavior is to create or use a separate connection.</Note>
		</Notes>
		<ReleaseDate>2026-03-20</ReleaseDate>
		<CVE>CVE-2026-3784</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>curl security update</Description>
				<DATE>2026-03-20</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1704</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>