<?xml version='1.0' encoding='UTF-8'?>
<updates><update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2026:1774530145</id>
    <title>Update of alt-openssl11</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- strip debug symbols from binary files</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- strip debug symbols from binary files</summary>
    <pushcount>0</pushcount>
    <issued date="2026-03-26 13:02:29 UTC" />
    <updated date="2026-03-26 13:02:29 UTC" />
    <references href="https://errata.tuxcare.com/els_alt_common/el7/CLSA-2026-1774530145.html" id="CLSA-2026:1774530145" title="CLSA-2026:1774530145" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-el7-els-alt-common</name>
        <package arch="x86_64" epoch="1" name="alt-openssl11" release="3.1.el7" src="alt-openssl11-1.1.1w-3.1.el7.src.rpm" version="1.1.1w">
          <filename>alt-openssl11-1.1.1w-3.1.el7.x86_64.rpm</filename>
          <sum type="sha256">23cf50712ef77b08c277cb22d94ea9e489a1d91d1dd248ef6e91b0ddea1b580f</sum>
        </package>
        <package arch="x86_64" epoch="1" name="alt-openssl11-devel" release="3.1.el7" src="alt-openssl11-1.1.1w-3.1.el7.src.rpm" version="1.1.1w">
          <filename>alt-openssl11-devel-1.1.1w-3.1.el7.x86_64.rpm</filename>
          <sum type="sha256">ca2485b60c388749d58aa77c713d4c860837159849deb55373afd7af06c70be8</sum>
        </package>
        <package arch="x86_64" epoch="1" name="alt-openssl11-libs" release="3.1.el7" src="alt-openssl11-1.1.1w-3.1.el7.src.rpm" version="1.1.1w">
          <filename>alt-openssl11-libs-1.1.1w-3.1.el7.x86_64.rpm</filename>
          <sum type="sha256">ea7670f62dcff4116b899a70f8a55d8721de3680b57c36921c385c8ead8c1b2b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1775146507</id>
    <title>alt-openssl11: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-5678: fix excessive time in DH check/generation with large Q
  parameter by adding bounds checks in DH_check_pub_key and DH_generate_key
- CVE-2024-0727: fix PKCS12 decoding NULL pointer dereference by adding NULL
  checks where ContentInfo data can be NULL</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-5678: fix excessive time in DH check/generation with large Q
  parameter by adding bounds checks in DH_check_pub_key and DH_generate_key
- CVE-2024-0727: fix PKCS12 decoding NULL pointer dereference by adding NULL
  checks where ContentInfo data can be NULL</summary>
    <pushcount>0</pushcount>
    <issued date="2026-04-02 16:15:11 UTC" />
    <updated date="2026-04-02 16:15:11 UTC" />
    <references href="https://errata.tuxcare.com/els_alt_common/el7/CLSA-2026-1775146507.html" id="CLSA-2026:1775146507" title="CLSA-2026:1775146507" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-el7-els-alt-common</name>
        <package arch="x86_64" epoch="1" name="alt-openssl11" release="3.2.el7" src="alt-openssl11-1.1.1w-3.2.el7.src.rpm" version="1.1.1w">
          <filename>alt-openssl11-1.1.1w-3.2.el7.x86_64.rpm</filename>
          <sum type="sha256">ac12898ae3e9127c8a07ae45b25ece782da8b60c4ff2cccb041c3493916d8a18</sum>
        </package>
        <package arch="x86_64" epoch="1" name="alt-openssl11-devel" release="3.2.el7" src="alt-openssl11-1.1.1w-3.2.el7.src.rpm" version="1.1.1w">
          <filename>alt-openssl11-devel-1.1.1w-3.2.el7.x86_64.rpm</filename>
          <sum type="sha256">1f03be491573718430872734c6975a1f5d51aaafa7acbcd02b8cdf77090c22e5</sum>
        </package>
        <package arch="x86_64" epoch="1" name="alt-openssl11-libs" release="3.2.el7" src="alt-openssl11-1.1.1w-3.2.el7.src.rpm" version="1.1.1w">
          <filename>alt-openssl11-libs-1.1.1w-3.2.el7.x86_64.rpm</filename>
          <sum type="sha256">a315194c62999d3f70219eaf280cad6b9019b0c7f12319221e461184ab96e957</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1776705439</id>
    <title>alt-openssl11: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-28387: fix use-after-free in DANE client code by using X509_free()
  instead of OPENSSL_free() to properly release reference-counted X509 objects
- CVE-2026-28388: fix NULL pointer dereference when processing a delta CRL
  that has a Delta CRL Indicator but lacks a CRL Number extension
- CVE-2026-28389: fix NULL pointer dereference in CMS KeyAgreeRecipientInfo
  processing when KeyEncryptionAlgorithmIdentifier omits the optional
  parameter field, by using safe X509_ALGOR_get0() extraction
- CVE-2026-28390: fix NULL pointer dereference in CMS KeyTransportRecipientInfo
  processing when RSA-OAEP SourceFunc parameters are missing, by using safe
  X509_ALGOR_get0() extraction and OPENSSL_memdup() for label data</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-28387: fix use-after-free in DANE client code by using X509_free()
  instead of OPENSSL_free() to properly release reference-counted X509 objects
- CVE-2026-28388: fix NULL pointer dereference when processing a delta CRL
  that has a Delta CRL Indicator but lacks a CRL Number extension
- CVE-2026-28389: fix NULL pointer dereference in CMS KeyAgreeRecipientInfo
  processing when KeyEncryptionAlgorithmIdentifier omits the optional
  parameter field, by using safe X509_ALGOR_get0() extraction
- CVE-2026-28390: fix NULL pointer dereference in CMS KeyTransportRecipientInfo
  processing when RSA-OAEP SourceFunc parameters are missing, by using safe
  X509_ALGOR_get0() extraction and OPENSSL_memdup() for label data</summary>
    <pushcount>0</pushcount>
    <issued date="2026-04-20 17:17:23 UTC" />
    <updated date="2026-04-20 17:17:23 UTC" />
    <references href="https://errata.tuxcare.com/els_alt_common/el7/CLSA-2026-1776705439.html" id="CLSA-2026:1776705439" title="CLSA-2026:1776705439" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-el7-els-alt-common</name>
        <package arch="x86_64" epoch="1" name="alt-openssl11" release="3.3.el7" src="alt-openssl11-1.1.1w-3.3.el7.src.rpm" version="1.1.1w">
          <filename>alt-openssl11-1.1.1w-3.3.el7.x86_64.rpm</filename>
          <sum type="sha256">839ed86e4915d4a78a8f5d9614fb69eddb352855caa2f8ab0e14861363b4bd01</sum>
        </package>
        <package arch="x86_64" epoch="1" name="alt-openssl11-devel" release="3.3.el7" src="alt-openssl11-1.1.1w-3.3.el7.src.rpm" version="1.1.1w">
          <filename>alt-openssl11-devel-1.1.1w-3.3.el7.x86_64.rpm</filename>
          <sum type="sha256">386764aa70cd8f2c2c715d12956784f86638ec1109048f51b3cac1cdd9adb3e9</sum>
        </package>
        <package arch="x86_64" epoch="1" name="alt-openssl11-libs" release="3.3.el7" src="alt-openssl11-1.1.1w-3.3.el7.src.rpm" version="1.1.1w">
          <filename>alt-openssl11-libs-1.1.1w-3.3.el7.x86_64.rpm</filename>
          <sum type="sha256">14a15ab1da7dbf9178f24c5ab05048ee8eca1349abeef7f483cf11ab8fbab1e5</sum>
        </package>
      </collection>
    </pkglist>
  </update>
</updates>