DEBIAN-CVE-2026-32144

Source
https://security-tracker.debian.org/tracker/CVE-2026-32144
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-32144.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-32144
Upstream
  • CVE-2026-32144
Published
2026-04-07T13:16:46.570Z
Modified
2026-04-28T20:31:35.197762Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

Improper Certificate Validation vulnerability in Erlang OTP publickey (pubkeyocsp module) allows OCSP designated-responder authorization bypass via missing signature verification. The OCSP response validation in publickey:pkixocspvalidate/5 does not verify that a CA-designated responder certificate was cryptographically signed by the issuing CA. Instead, it only checks that the responder certificate's issuer name matches the CA's subject name and that the certificate has the OCSPSigning extended key usage. An attacker who can intercept or control OCSP responses can create a self-signed certificate with a matching issuer name and the OCSPSigning EKU, and use it to forge OCSP responses that mark revoked certificates as valid. This affects SSL/TLS clients using OCSP stapling, which may accept connections to servers with revoked certificates, potentially transmitting sensitive data to compromised servers. Applications using the publickey:pkixocspvalidate/5 API directly are also affected, with impact depending on usage context. This vulnerability is associated with program files lib/publickey/src/pubkeyocsp.erl and program routines pubkeyocsp:isauthorizedresponder/3. This issue affects OTP from OTP 27.0 until OTP 28.4.2 and 27.3.4.10 corresponding to publickey from 1.16 until 1.20.3 and 1.17.1.2, and ssl from 11.2 until 11.5.4 and 11.2.12.7.

References

Affected packages

Debian:13 / erlang

Package

Name
erlang
Purl
pkg:deb/debian/erlang?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:27.*
1:27.3.4.1+dfsg-1
1:27.3.4.1+dfsg-1+deb13u1
1:27.3.4.3+dfsg-1
1:27.3.4.4+dfsg-1
1:27.3.4.6+dfsg-1
1:27.3.4.8+dfsg-1
1:27.3.4.9+dfsg-1
1:27.3.4.10+dfsg-1
1:27.3.4.11+dfsg-1
1:28.*
1:28.0+dfsg-1
1:28.0.1+dfsg-1
1:28.0.2+dfsg-1
1:28.0.4+dfsg-1
1:28.1.1+dfsg-1
1:28.2+dfsg-1
1:28.3+dfsg-1
1:28.3.1+dfsg-1
1:29.*
1:29.0~rc1+dfsg-1
1:29.0~rc1+dfsg-2
1:29.0~rc2+dfsg-1
1:29.0~rc3+dfsg-1
1:29.0~rc3+dfsg-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-32144.json"

Debian:14 / erlang

Package

Name
erlang
Purl
pkg:deb/debian/erlang?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:27.3.4.10+dfsg-1

Affected versions

1:27.*
1:27.3.4.1+dfsg-1
1:27.3.4.3+dfsg-1
1:27.3.4.4+dfsg-1
1:27.3.4.6+dfsg-1
1:27.3.4.8+dfsg-1
1:27.3.4.9+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-32144.json"