Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

OpenSSL: Empty DNS name in certificate chain can crash verification

UBUNTU-CVE-2026-27138
Summary

A bug in OpenSSL can cause a program to crash when verifying an X.509 certificate chain. This can happen when the chain includes a certificate with an empty DNS name and another certificate with restrictions on which names are allowed. To prevent a crash, update to the latest version of OpenSSL.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
canonical golang-1.24 All versions
canonical golang-1.25 All versions
Original title
Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either ...
Original description
Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.
Published: 9 Mar 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026