Release date:
2026-05-12 11:06:16 UTC
Description:
* SECURITY UPDATE: A use-after-free / heap corruption in dane_match() of
the X.509 verifier where the cached DANE-matched certificate was freed
via OPENSSL_free() instead of X509_free(), bypassing the X509 reference
counting and freeing certificate fields that may still be referenced by
other holders. An attacker able to influence the DANE TLSA records used
during certificate verification can trigger memory corruption.
- debian/patches/CVE-2026-28387.patch: replace OPENSSL_free(dane->mcert)
with X509_free(dane->mcert) in dane_match() in crypto/x509/x509_vfy.c.
- CVE-2026-28387
* SECURITY UPDATE: A NULL pointer dereference in check_delta_base() of
the X.509 CRL verifier when a delta CRL lacks the CRL Number extension.
A remote attacker controlling a delta CRL can trigger a crash, leading
to Denial of Service in applications using -crl_check with -use_deltas.
- debian/patches/CVE-2026-28388.patch: NULL-check delta->crl_number
before passing it to ASN1_INTEGER_cmp() in check_delta_base() in
crypto/x509/x509_vfy.c, and ship the upstream test fixtures and
verify recipe.
- CVE-2026-28388
Updated packages:
-
libssl-dev_1.1.1f-1ubuntu2.24+tuxcare.els4_amd64.deb
sha:75c84e5d81974077afcc2de159bd856d4b8c44a0
-
libssl-doc_1.1.1f-1ubuntu2.24+tuxcare.els4_all.deb
sha:c70bac3648925ad4ce9536f2aec452e9e95f4724
-
libssl1.1_1.1.1f-1ubuntu2.24+tuxcare.els4_amd64.deb
sha:5078f54c5a87725764081ed0b4d7f97f9ec47695
-
openssl_1.1.1f-1ubuntu2.24+tuxcare.els4_amd64.deb
sha:b1c07e6ee3e25368284288e934f627e7c3bdb2b8
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.