[CLSA-2026:1778583971] Fix CVE(s): CVE-2026-28387, CVE-2026-28388
Type:
security
Severity:
Important
Release date:
2026-05-12 11:06:16 UTC
Description:
* SECURITY UPDATE: A use-after-free / heap corruption in dane_match() of the X.509 verifier where the cached DANE-matched certificate was freed via OPENSSL_free() instead of X509_free(), bypassing the X509 reference counting and freeing certificate fields that may still be referenced by other holders. An attacker able to influence the DANE TLSA records used during certificate verification can trigger memory corruption. - debian/patches/CVE-2026-28387.patch: replace OPENSSL_free(dane->mcert) with X509_free(dane->mcert) in dane_match() in crypto/x509/x509_vfy.c. - CVE-2026-28387 * SECURITY UPDATE: A NULL pointer dereference in check_delta_base() of the X.509 CRL verifier when a delta CRL lacks the CRL Number extension. A remote attacker controlling a delta CRL can trigger a crash, leading to Denial of Service in applications using -crl_check with -use_deltas. - debian/patches/CVE-2026-28388.patch: NULL-check delta->crl_number before passing it to ASN1_INTEGER_cmp() in check_delta_base() in crypto/x509/x509_vfy.c, and ship the upstream test fixtures and verify recipe. - CVE-2026-28388
Updated packages:
  • libssl-dev_1.1.1f-1ubuntu2.24+tuxcare.els4_amd64.deb
    sha:75c84e5d81974077afcc2de159bd856d4b8c44a0
  • libssl-doc_1.1.1f-1ubuntu2.24+tuxcare.els4_all.deb
    sha:c70bac3648925ad4ce9536f2aec452e9e95f4724
  • libssl1.1_1.1.1f-1ubuntu2.24+tuxcare.els4_amd64.deb
    sha:5078f54c5a87725764081ed0b4d7f97f9ec47695
  • openssl_1.1.1f-1ubuntu2.24+tuxcare.els4_amd64.deb
    sha:b1c07e6ee3e25368284288e934f627e7c3bdb2b8
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.