Release date:
2026-05-14 22:19:12 UTC
Description:
* SECURITY UPDATE: Use-after-free / heap corruption in dane_match() of
the X.509 verifier where the cached DANE-matched certificate was freed
via OPENSSL_free() instead of X509_free(), bypassing the X509 reference
counting and freeing certificate fields that may still be referenced by
other holders. An attacker able to influence the DANE TLSA records used
during certificate verification can trigger memory corruption.
- debian/patches/CVE-2026-28387.patch: replace OPENSSL_free(dane->mcert)
with X509_free(dane->mcert) in dane_match() in crypto/x509/x509_vfy.c.
- CVE-2026-28387
* SECURITY UPDATE: NULL pointer dereference in check_delta_base() of
the X.509 CRL verifier when a delta CRL lacks the CRL Number extension.
A remote attacker controlling a delta CRL can trigger a crash, leading
to denial of service in applications using -crl_check with -use_deltas.
- debian/patches/CVE-2026-28388.patch: NULL-check delta->crl_number
before passing it to ASN1_INTEGER_cmp() in check_delta_base() in
crypto/x509/x509_vfy.c, and ship the upstream test fixtures and
verify recipe.
- CVE-2026-28388
* SECURITY UPDATE: NULL pointer dereference in dh_cms_set_shared_info()
and ecdh_cms_set_shared_info() when a CMS KeyAgreeRecipientInfo has
no KeyEncryptionAlgorithmIdentifier parameters field, allowing a
remote attacker to trigger a denial of service via crafted CMS data.
- debian/patches/CVE-2026-28389.patch: NULL-check alg->parameter
before accessing its type in crypto/dh/dh_ameth.c and
crypto/ec/ec_ameth.c.
- CVE-2026-28389
Updated packages:
-
libssl-dev_1.1.1-1ubuntu2.1~18.04.23+tuxcare.els9_amd64.deb
sha:cd158a1b47bea46f1e71e80144ed7df94934614a
-
libssl-doc_1.1.1-1ubuntu2.1~18.04.23+tuxcare.els9_all.deb
sha:31e86cb986a48919fcea30bd2a51faa235b81b80
-
libssl1.1_1.1.1-1ubuntu2.1~18.04.23+tuxcare.els9_amd64.deb
sha:a3f6be73a972880fb28315a7e66aa1f84952f2e3
-
openssl_1.1.1-1ubuntu2.1~18.04.23+tuxcare.els9_amd64.deb
sha:07677f31f24b4d0aca0a12f6493d57f97ff53925
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.