{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "strip debug symbols from binary files",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1774531653",
        "url": "https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1774531653"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_alt_common/el10/advisories/2026/clsa-2026_1774531653.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-03-26T13:28:11Z",
      "generator": {
        "date": "2026-03-26T13:28:11Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1774531653",
      "initial_release_date": "2026-03-26T13:28:11Z",
      "revision_history": [
        {
          "date": "2026-03-26T13:28:11Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Update of alt-openssl11"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 9",
                "product": {
                  "name": "Community Enterprise Operating System 9",
                  "product_id": "CentOS-10",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:10:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Cloud Linux Software, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "alt-openssl11-libs-1:1.1.1w-3.1.el10.x86_64",
                "product": {
                  "name": "alt-openssl11-libs-1:1.1.1w-3.1.el10.x86_64",
                  "product_id": "alt-openssl11-libs-1:1.1.1w-3.1.el10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/alt-openssl11-libs@1.1.1w-3.1.el10?arch=x86_64&epoch=1&os_name=centos&os_version=9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-openssl11-devel-1:1.1.1w-3.1.el10.x86_64",
                "product": {
                  "name": "alt-openssl11-devel-1:1.1.1w-3.1.el10.x86_64",
                  "product_id": "alt-openssl11-devel-1:1.1.1w-3.1.el10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/alt-openssl11-devel@1.1.1w-3.1.el10?arch=x86_64&epoch=1&os_name=centos&os_version=9"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-openssl11-1:1.1.1w-3.1.el10.x86_64",
                "product": {
                  "name": "alt-openssl11-1:1.1.1w-3.1.el10.x86_64",
                  "product_id": "alt-openssl11-1:1.1.1w-3.1.el10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/alt-openssl11@1.1.1w-3.1.el10?arch=x86_64&epoch=1&os_name=centos&os_version=9"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-openssl11-libs-1:1.1.1w-3.1.el10.x86_64 as a component of Community Enterprise Operating System 9",
          "product_id": "CentOS-10:alt-openssl11-libs-1:1.1.1w-3.1.el10.x86_64"
        },
        "product_reference": "alt-openssl11-libs-1:1.1.1w-3.1.el10.x86_64",
        "relates_to_product_reference": "CentOS-10"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-openssl11-devel-1:1.1.1w-3.1.el10.x86_64 as a component of Community Enterprise Operating System 9",
          "product_id": "CentOS-10:alt-openssl11-devel-1:1.1.1w-3.1.el10.x86_64"
        },
        "product_reference": "alt-openssl11-devel-1:1.1.1w-3.1.el10.x86_64",
        "relates_to_product_reference": "CentOS-10"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-openssl11-1:1.1.1w-3.1.el10.x86_64 as a component of Community Enterprise Operating System 9",
          "product_id": "CentOS-10:alt-openssl11-1:1.1.1w-3.1.el10.x86_64"
        },
        "product_reference": "alt-openssl11-1:1.1.1w-3.1.el10.x86_64",
        "relates_to_product_reference": "CentOS-10"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-22796",
      "cwe": {
        "id": "CWE-1287",
        "name": "Improper Validation of Specified Type of Input"
      },
      "notes": [
        {
          "category": "description",
          "text": "Issue summary: A type confusion vulnerability exists in the signature\nverification of signed PKCS#7 data where an ASN1_TYPE union member is\naccessed without first validating the type, causing an invalid or NULL\npointer dereference when processing malformed PKCS#7 data.\nImpact summary: An application performing signature verification of PKCS#7\ndata or calling directly the PKCS7_digest_from_attributes() function can be\ncaused to dereference an invalid or NULL pointer when reading, resulting in\na Denial of Service.\nThe function PKCS7_digest_from_attributes() accesses the message digest attribute\nvalue without validating its type. When the type is not V_ASN1_OCTET_STRING,\nthis results in accessing invalid memory through the ASN1_TYPE union, causing\na crash.\nExploiting this vulnerability requires an attacker to provide a malformed\nsigned PKCS#7 to an application that verifies it. The impact of the\nexploit is just a Denial of Service, the PKCS7 API is legacy and applications\nshould be using the CMS API instead. For these reasons the issue was\nassessed as Low severity.\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#7 parsing implementation is outside the OpenSSL FIPS module\nboundary.\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-10:alt-openssl11-1:1.1.1w-3.1.el10.x86_64",
          "CentOS-10:alt-openssl11-devel-1:1.1.1w-3.1.el10.x86_64",
          "CentOS-10:alt-openssl11-libs-1:1.1.1w-3.1.el10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-common/cve/CVE-2026-22796"
        }
      ],
      "release_date": "2026-01-27T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T13:27:35.961626Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1774531653",
          "product_ids": [
            "CentOS-10:alt-openssl11-1:1.1.1w-3.1.el10.x86_64",
            "CentOS-10:alt-openssl11-devel-1:1.1.1w-3.1.el10.x86_64",
            "CentOS-10:alt-openssl11-libs-1:1.1.1w-3.1.el10.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1774531653"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-10:alt-openssl11-1:1.1.1w-3.1.el10.x86_64",
            "CentOS-10:alt-openssl11-devel-1:1.1.1w-3.1.el10.x86_64",
            "CentOS-10:alt-openssl11-libs-1:1.1.1w-3.1.el10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-69421",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer\ndereference in the PKCS12_item_decrypt_d2i_ex() function.\n\nImpact summary: A NULL pointer dereference can trigger a crash which leads to\nDenial of Service for an application processing PKCS#12 files.\n\nThe PKCS12_item_decrypt_d2i_ex() function does not check whether the oct\nparameter is NULL before dereferencing it. When called from\nPKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can\nbe NULL, causing a crash. The vulnerability is limited to Denial of Service\nand cannot be escalated to achieve code execution or memory disclosure.\n\nExploiting this issue requires an attacker to provide a malformed PKCS#12 file\nto an application that processes it. For that reason the issue was assessed as\nLow severity according to our Security Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-10:alt-openssl11-1:1.1.1w-3.1.el10.x86_64",
          "CentOS-10:alt-openssl11-devel-1:1.1.1w-3.1.el10.x86_64",
          "CentOS-10:alt-openssl11-libs-1:1.1.1w-3.1.el10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-common/cve/CVE-2025-69421"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b",
          "url": "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7",
          "url": "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd",
          "url": "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3",
          "url": "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c",
          "url": "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c"
        },
        {
          "category": "external",
          "summary": "https://openssl-library.org/news/secadv/20260127.txt",
          "url": "https://openssl-library.org/news/secadv/20260127.txt"
        }
      ],
      "release_date": "2026-01-27T16:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T13:27:35.961626Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1774531653",
          "product_ids": [
            "CentOS-10:alt-openssl11-1:1.1.1w-3.1.el10.x86_64",
            "CentOS-10:alt-openssl11-devel-1:1.1.1w-3.1.el10.x86_64",
            "CentOS-10:alt-openssl11-libs-1:1.1.1w-3.1.el10.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1774531653"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-10:alt-openssl11-1:1.1.1w-3.1.el10.x86_64",
            "CentOS-10:alt-openssl11-devel-1:1.1.1w-3.1.el10.x86_64",
            "CentOS-10:alt-openssl11-libs-1:1.1.1w-3.1.el10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}