Origin Validation Error Affecting libcurl-devel package, versions *


Severity

Recommended
0.0
low
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-LIBCURLDEVEL-16354112
  • published3 May 2026
  • disclosed29 Apr 2026

Introduced: 29 Apr 2026

NewCVE-2026-6276  (opens in a new tab)
CWE-346  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:8 libcurl-devel.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libcurl-devel package and not the libcurl-devel package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

Using libcurl, when a custom Host: header is first set for an HTTP request and a second request is subsequently done using the same easy handle but without the custom Host: header set, the second request would use stale information and pass on cookies meant for the first host in the second request. Leak them.

CVSS Base Scores

version 3.1