- Issued:
- 2026-01-29
- Updated:
- 2026-01-29
RHBA-2026:1601 - Bug Fix Advisory
Synopsis
updated Red Hat OpenJDK 11 els for RHEL 9 container images
Type/Severity
Bug Fix Advisory
Topic
Updated Red Hat OpenJDK 11 els for RHEL 9 container images are now available
Description
The Red Hat OpenJDK 11 els for RHEL 9 container images have been updated to address the following security advisory: RHSA-2026:1473 (see References)
Users of Red Hat OpenJDK 11 els for RHEL 9 container images are advised to upgrade to these updated images, which contain backported patches to correct these security issues, fix these bugs and add these enhancements. Users of these images are also encouraged to rebuild all container images that depend on these images.
You can find images updated by this advisory in Red Hat Container Catalog (see References).
Solution
The Red Hat OpenJDK 11 els for RHEL 9 container images provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).
Dockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.
Affected Products
- OpenJDK Java Extended Life Cycle Support 11 for RHEL 9 x86_64
- OpenJDK Java Extended Life Cycle Support 11 for RHEL 9 s390x
- OpenJDK Java Extended Life Cycle Support 11 for RHEL 9 ppc64le
- OpenJDK Java Extended Life Cycle Support 11 for RHEL 9 aarch64
Fixes
- BZ - 2430375 - CVE-2025-11187 openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file
- BZ - 2430376 - CVE-2025-15467 openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing
- BZ - 2430377 - CVE-2025-15468 openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling
- BZ - 2430378 - CVE-2025-15469 openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation
- BZ - 2430379 - CVE-2025-66199 openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression
- BZ - 2430380 - CVE-2025-68160 openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter
- BZ - 2430381 - CVE-2025-69418 openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls
- BZ - 2430386 - CVE-2025-69419 openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing
- BZ - 2430387 - CVE-2025-69421 openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing
- BZ - 2430388 - CVE-2025-69420 openssl: OpenSSL: Denial of Service via malformed TimeStamp Response
- BZ - 2430389 - CVE-2026-22795 openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing
- BZ - 2430390 - CVE-2026-22796 openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification
CVEs
aarch64
| openjdk-els/openjdk-11-rhel9@sha256:981f3ecfc88d9bd17e7b7306ee22bf08e0438d9c78ef9dbb746ce626f51071a5 |
| openjdk-els/openjdk-11-runtime-rhel9@sha256:f6c967a8fc9aceaf8226f1809c08e955a465dbca32be9f844ca96c2cd6ef44b8 |
ppc64le
| openjdk-els/openjdk-11-rhel9@sha256:c49e76bf82cd86691337a1362160a6f97173150df6425ed42c93c01b864bc293 |
| openjdk-els/openjdk-11-runtime-rhel9@sha256:93a1387a67cb58955d11b728e97a4f1828b52dcaec0a48739308bf016bc5de5e |
s390x
| openjdk-els/openjdk-11-rhel9@sha256:6c9016b50e41a0ec57ca7153f281aae9b8c055be1d323754a61d28592bd6e76a |
| openjdk-els/openjdk-11-runtime-rhel9@sha256:bf79dcddcc4470341e4a6f0a8c43c084cd58023c9e333444ded19f64a6604275 |
x86_64
| openjdk-els/openjdk-11-rhel9@sha256:752283d68d703dc7ab3a481c778301aed3268cffbd62fe7de25af302ccae596d |
| openjdk-els/openjdk-11-runtime-rhel9@sha256:25714ec7c74dd4c6f21aae706f891f3f6f4dedebe91f923e11299040123ac85d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.