Release date:
2026-04-30 16:45:09 UTC
Description:
- CVE-2026-28387: fix use-after-free / double-free in dane_match()
by releasing the previously stored dane->mcert with X509_free()
instead of OPENSSL_free(); the slot is reference-bumped via
X509_up_ref() so the matching free is X509_free()
Updated packages:
-
openssl-1.1.1k-5.el8.5.tuxcare.els18.x86_64.rpm
sha:8cc9d65842d0912ddf0ccdf44b95e638301ed4c6a89c5b907a123b16cc78aa77
-
openssl-devel-1.1.1k-5.el8.5.tuxcare.els18.i686.rpm
sha:13e3602a1a6d9182098c1e0a09c2f069e3ce7fc002ae546aa8edddbef4dcf04f
-
openssl-devel-1.1.1k-5.el8.5.tuxcare.els18.x86_64.rpm
sha:aba1816110ef5c6e1824be9ced802b5fa5730c19a512691f13ac8a43f11149d4
-
openssl-libs-1.1.1k-5.el8.5.tuxcare.els18.i686.rpm
sha:d28b9e9661a402616f189c4c8065561d60dd2d04a8cf4fa75bd78909171b311c
-
openssl-libs-1.1.1k-5.el8.5.tuxcare.els18.x86_64.rpm
sha:ae2956d1ce34886c0beff8cd767b6e83bab0ae2c07dc3e87d6ce592c79621193
-
openssl-perl-1.1.1k-5.el8.5.tuxcare.els18.x86_64.rpm
sha:194317540eeac80ede90700787477ef3d8153b301aa3058a733cd4179d9798a6
-
openssl-static-1.1.1k-5.el8.5.tuxcare.els18.x86_64.rpm
sha:154bcd80eb623521ec470bbf7db37c60772d54723b387bca1da5eea3e8232df4
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.