[CLSA-2026:1777567502] openssl: Fix of CVE-2026-28387
Type:
security
Severity:
Important
Release date:
2026-04-30 16:45:09 UTC
Description:
- CVE-2026-28387: fix use-after-free / double-free in dane_match() by releasing the previously stored dane->mcert with X509_free() instead of OPENSSL_free(); the slot is reference-bumped via X509_up_ref() so the matching free is X509_free()
Updated packages:
  • openssl-1.1.1k-5.el8.5.tuxcare.els18.x86_64.rpm
    sha:8cc9d65842d0912ddf0ccdf44b95e638301ed4c6a89c5b907a123b16cc78aa77
  • openssl-devel-1.1.1k-5.el8.5.tuxcare.els18.i686.rpm
    sha:13e3602a1a6d9182098c1e0a09c2f069e3ce7fc002ae546aa8edddbef4dcf04f
  • openssl-devel-1.1.1k-5.el8.5.tuxcare.els18.x86_64.rpm
    sha:aba1816110ef5c6e1824be9ced802b5fa5730c19a512691f13ac8a43f11149d4
  • openssl-libs-1.1.1k-5.el8.5.tuxcare.els18.i686.rpm
    sha:d28b9e9661a402616f189c4c8065561d60dd2d04a8cf4fa75bd78909171b311c
  • openssl-libs-1.1.1k-5.el8.5.tuxcare.els18.x86_64.rpm
    sha:ae2956d1ce34886c0beff8cd767b6e83bab0ae2c07dc3e87d6ce592c79621193
  • openssl-perl-1.1.1k-5.el8.5.tuxcare.els18.x86_64.rpm
    sha:194317540eeac80ede90700787477ef3d8153b301aa3058a733cd4179d9798a6
  • openssl-static-1.1.1k-5.el8.5.tuxcare.els18.x86_64.rpm
    sha:154bcd80eb623521ec470bbf7db37c60772d54723b387bca1da5eea3e8232df4
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.