Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:1472 - Security Advisory
Issued:
2026-01-28
Updated:
2026-01-28

RHSA-2026:1472 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: openssl security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for openssl is now available for Red Hat Enterprise Linux 10.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.

Security Fix(es):

  • openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file (CVE-2025-11187)
  • openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing (CVE-2025-15467)
  • openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling (CVE-2025-15468)
  • openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation (CVE-2025-15469)
  • openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression (CVE-2025-66199)
  • openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter (CVE-2025-68160)
  • openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls (CVE-2025-69418)
  • openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing (CVE-2025-69419)
  • openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing (CVE-2025-69421)
  • openssl: OpenSSL: Denial of Service via malformed TimeStamp Response (CVE-2025-69420)
  • openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing (CVE-2026-22795)
  • openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification (CVE-2026-22796)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 10 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 10 s390x
  • Red Hat Enterprise Linux for Power, little endian 10 ppc64le
  • Red Hat Enterprise Linux for ARM 64 10 aarch64

Fixes

  • BZ - 2430375 - CVE-2025-11187 openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file
  • BZ - 2430376 - CVE-2025-15467 openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing
  • BZ - 2430377 - CVE-2025-15468 openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling
  • BZ - 2430378 - CVE-2025-15469 openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation
  • BZ - 2430379 - CVE-2025-66199 openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression
  • BZ - 2430380 - CVE-2025-68160 openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter
  • BZ - 2430381 - CVE-2025-69418 openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls
  • BZ - 2430386 - CVE-2025-69419 openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing
  • BZ - 2430387 - CVE-2025-69421 openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing
  • BZ - 2430388 - CVE-2025-69420 openssl: OpenSSL: Denial of Service via malformed TimeStamp Response
  • BZ - 2430389 - CVE-2026-22795 openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing
  • BZ - 2430390 - CVE-2026-22796 openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification

CVEs

  • CVE-2025-11187
  • CVE-2025-15467
  • CVE-2025-15468
  • CVE-2025-15469
  • CVE-2025-66199
  • CVE-2025-68160
  • CVE-2025-69418
  • CVE-2025-69419
  • CVE-2025-69420
  • CVE-2025-69421
  • CVE-2026-22795
  • CVE-2026-22796

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 10

SRPM
openssl-3.5.1-7.el10_1.src.rpm SHA-256: 648b8cd38cd34ffd462cb490fa75729efa38f5d3e799918378d51679ce03c3bd
x86_64
openssl-3.5.1-7.el10_1.x86_64.rpm SHA-256: 50284410b98fd8dce23e20ab3ebb485295570f5bf0b7a969bca9beca1b92c360
openssl-debuginfo-3.5.1-7.el10_1.x86_64.rpm SHA-256: ffc8d88807870db5cc9fff627c3513c23dd0b33625607983cb6ff3ad5f61428d
openssl-debuginfo-3.5.1-7.el10_1.x86_64.rpm SHA-256: ffc8d88807870db5cc9fff627c3513c23dd0b33625607983cb6ff3ad5f61428d
openssl-debugsource-3.5.1-7.el10_1.x86_64.rpm SHA-256: e61df9ef60b6d42d3f2d3c3caa0aa2426200d88da80a30ba5231881e896ae0cb
openssl-debugsource-3.5.1-7.el10_1.x86_64.rpm SHA-256: e61df9ef60b6d42d3f2d3c3caa0aa2426200d88da80a30ba5231881e896ae0cb
openssl-devel-3.5.1-7.el10_1.x86_64.rpm SHA-256: 71ceb09df978afbbe787f9326bdc2f0ac85319527b42b837c0f80fa204ec3efa
openssl-libs-3.5.1-7.el10_1.x86_64.rpm SHA-256: f45efed30998502d25c9f87bd4ab0133cca96c6cd74b774b92f9f4342ad4733e
openssl-libs-debuginfo-3.5.1-7.el10_1.x86_64.rpm SHA-256: 26222b778a4707304a20f438fa139babf64f7facae15e10f131688e023ebb265
openssl-libs-debuginfo-3.5.1-7.el10_1.x86_64.rpm SHA-256: 26222b778a4707304a20f438fa139babf64f7facae15e10f131688e023ebb265
openssl-perl-3.5.1-7.el10_1.x86_64.rpm SHA-256: 90acdc7a0d811eff2af9e50d503050d14f7dc06879e23769c51d5eb9069b16e2

Red Hat Enterprise Linux for IBM z Systems 10

SRPM
openssl-3.5.1-7.el10_1.src.rpm SHA-256: 648b8cd38cd34ffd462cb490fa75729efa38f5d3e799918378d51679ce03c3bd
s390x
openssl-3.5.1-7.el10_1.s390x.rpm SHA-256: b722cafbcef703973cf1e5da3b46b705fdda564a79bdd2bee28ab731ba90ca77
openssl-debuginfo-3.5.1-7.el10_1.s390x.rpm SHA-256: e03240639a8901f8dec121d3125a1eb094308134b2332bce9b85e3d05166e119
openssl-debuginfo-3.5.1-7.el10_1.s390x.rpm SHA-256: e03240639a8901f8dec121d3125a1eb094308134b2332bce9b85e3d05166e119
openssl-debugsource-3.5.1-7.el10_1.s390x.rpm SHA-256: c232257acec47c9548eba35e54e3d0efe168a395efd33efaeab2b817c8093498
openssl-debugsource-3.5.1-7.el10_1.s390x.rpm SHA-256: c232257acec47c9548eba35e54e3d0efe168a395efd33efaeab2b817c8093498
openssl-devel-3.5.1-7.el10_1.s390x.rpm SHA-256: 22b4fe86347290fc9c36ea6e07b773b374e225b4ddf5fc4c32d19c6d17d1932d
openssl-libs-3.5.1-7.el10_1.s390x.rpm SHA-256: 9a571c5147d0c866b1ab6967fb9c1eed1e8678145be7b92895908ad53d719800
openssl-libs-debuginfo-3.5.1-7.el10_1.s390x.rpm SHA-256: 1f5599882f247182a92dcfbb4c7a1d2f01aefa873668a26fdb4df095a6e02e8c
openssl-libs-debuginfo-3.5.1-7.el10_1.s390x.rpm SHA-256: 1f5599882f247182a92dcfbb4c7a1d2f01aefa873668a26fdb4df095a6e02e8c
openssl-perl-3.5.1-7.el10_1.s390x.rpm SHA-256: 80f8f432ee54fd0160550134353f371fe590f8c756848f229c09b8fbe62b3ff4

Red Hat Enterprise Linux for Power, little endian 10

SRPM
openssl-3.5.1-7.el10_1.src.rpm SHA-256: 648b8cd38cd34ffd462cb490fa75729efa38f5d3e799918378d51679ce03c3bd
ppc64le
openssl-3.5.1-7.el10_1.ppc64le.rpm SHA-256: c1213bce93039a993f8f740be5b62ff4fae18c05738a4906ffed4cc7bcac9579
openssl-debuginfo-3.5.1-7.el10_1.ppc64le.rpm SHA-256: 3f08c9a97907fa3056acf7a8d6b3aedaaef3816a6737619310d7c7b09066128b
openssl-debuginfo-3.5.1-7.el10_1.ppc64le.rpm SHA-256: 3f08c9a97907fa3056acf7a8d6b3aedaaef3816a6737619310d7c7b09066128b
openssl-debugsource-3.5.1-7.el10_1.ppc64le.rpm SHA-256: 12cf37811f91223face55470d5d2943e4fe53ca86302a3f655f6761eab97afd0
openssl-debugsource-3.5.1-7.el10_1.ppc64le.rpm SHA-256: 12cf37811f91223face55470d5d2943e4fe53ca86302a3f655f6761eab97afd0
openssl-devel-3.5.1-7.el10_1.ppc64le.rpm SHA-256: 9972a3ba39d6cf5815b0d41677b110d50c260ecce8155525439ed248851c4ffa
openssl-libs-3.5.1-7.el10_1.ppc64le.rpm SHA-256: 4e4d6686ca4b26bec0e9679f42b3ba96e84679b1ee897f77080c9822e1ae1d56
openssl-libs-debuginfo-3.5.1-7.el10_1.ppc64le.rpm SHA-256: f743191358699d5fbeb07492f8ac102048b5d4dae42801617dfcfd3572f89b5e
openssl-libs-debuginfo-3.5.1-7.el10_1.ppc64le.rpm SHA-256: f743191358699d5fbeb07492f8ac102048b5d4dae42801617dfcfd3572f89b5e
openssl-perl-3.5.1-7.el10_1.ppc64le.rpm SHA-256: b6a42ab07ea6822c0c84ea7277d4cce0e9935bcaa9009c16935455ebec2cc5b4

Red Hat Enterprise Linux for ARM 64 10

SRPM
openssl-3.5.1-7.el10_1.src.rpm SHA-256: 648b8cd38cd34ffd462cb490fa75729efa38f5d3e799918378d51679ce03c3bd
aarch64
openssl-3.5.1-7.el10_1.aarch64.rpm SHA-256: b10640dac66d6ede9935c0cbb055334c2fbebc56d16e41a58aca7fa503c44ebc
openssl-debuginfo-3.5.1-7.el10_1.aarch64.rpm SHA-256: 10e8671f51d0223619332da7b7e9a30122b31203d4cede7b81343c69b556fc9a
openssl-debuginfo-3.5.1-7.el10_1.aarch64.rpm SHA-256: 10e8671f51d0223619332da7b7e9a30122b31203d4cede7b81343c69b556fc9a
openssl-debugsource-3.5.1-7.el10_1.aarch64.rpm SHA-256: f67b6f5a4bc9a752318dbe63406abfe33dc8f0a1c10480a9b582e7363ca6717e
openssl-debugsource-3.5.1-7.el10_1.aarch64.rpm SHA-256: f67b6f5a4bc9a752318dbe63406abfe33dc8f0a1c10480a9b582e7363ca6717e
openssl-devel-3.5.1-7.el10_1.aarch64.rpm SHA-256: 3879c9bfcabc8a549168e04d4fae45736496fde8e73231292877e1d880507daf
openssl-libs-3.5.1-7.el10_1.aarch64.rpm SHA-256: 9ad5857ff9e1158de19422c9647491697dd039d81f45862bda008248dc2703b5
openssl-libs-debuginfo-3.5.1-7.el10_1.aarch64.rpm SHA-256: 76c6d33635bc625ea279acea5a8bd01c5a1f39537406375b118703c92730e0a1
openssl-libs-debuginfo-3.5.1-7.el10_1.aarch64.rpm SHA-256: 76c6d33635bc625ea279acea5a8bd01c5a1f39537406375b118703c92730e0a1
openssl-perl-3.5.1-7.el10_1.aarch64.rpm SHA-256: 09cec9f928eac497fa84ca0d1f6cc1fdc07263a500d7c394a3ccf34441f320ba

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility