Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:1473 - Security Advisory
Issued:
2026-01-28
Updated:
2026-01-28

RHSA-2026:1473 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: openssl security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for openssl is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.

Security Fix(es):

  • openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file (CVE-2025-11187)
  • openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing (CVE-2025-15467)
  • openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling (CVE-2025-15468)
  • openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation (CVE-2025-15469)
  • openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression (CVE-2025-66199)
  • openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter (CVE-2025-68160)
  • openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls (CVE-2025-69418)
  • openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing (CVE-2025-69419)
  • openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing (CVE-2025-69421)
  • openssl: OpenSSL: Denial of Service via malformed TimeStamp Response (CVE-2025-69420)
  • openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing (CVE-2026-22795)
  • openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification (CVE-2026-22796)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64

Fixes

  • BZ - 2430375 - CVE-2025-11187 openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file
  • BZ - 2430376 - CVE-2025-15467 openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing
  • BZ - 2430377 - CVE-2025-15468 openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling
  • BZ - 2430378 - CVE-2025-15469 openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation
  • BZ - 2430379 - CVE-2025-66199 openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression
  • BZ - 2430380 - CVE-2025-68160 openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter
  • BZ - 2430381 - CVE-2025-69418 openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls
  • BZ - 2430386 - CVE-2025-69419 openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing
  • BZ - 2430387 - CVE-2025-69421 openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing
  • BZ - 2430388 - CVE-2025-69420 openssl: OpenSSL: Denial of Service via malformed TimeStamp Response
  • BZ - 2430389 - CVE-2026-22795 openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing
  • BZ - 2430390 - CVE-2026-22796 openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification

CVEs

  • CVE-2025-11187
  • CVE-2025-15467
  • CVE-2025-15468
  • CVE-2025-15469
  • CVE-2025-66199
  • CVE-2025-68160
  • CVE-2025-69418
  • CVE-2025-69419
  • CVE-2025-69420
  • CVE-2025-69421
  • CVE-2026-22795
  • CVE-2026-22796

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 9

SRPM
openssl-3.5.1-7.el9_7.src.rpm SHA-256: 6c9d66a1a6fe1b461d6e030f7b1f286555b83bdafcd14f90cd9d77f17f7177eb
x86_64
openssl-3.5.1-7.el9_7.x86_64.rpm SHA-256: efc3eb2f303047d5244a0f717a13615820d0de977c62d58bbe6d04ce35df8c6e
openssl-debuginfo-3.5.1-7.el9_7.i686.rpm SHA-256: 64d3e85b8f3809462600873121c02558b4433b1141a64326a5eb99e9a93647cd
openssl-debuginfo-3.5.1-7.el9_7.i686.rpm SHA-256: 64d3e85b8f3809462600873121c02558b4433b1141a64326a5eb99e9a93647cd
openssl-debuginfo-3.5.1-7.el9_7.x86_64.rpm SHA-256: f2fdf7165e0f7524087bfb8313954f373836bab3d723752ddc896a5f0f100935
openssl-debuginfo-3.5.1-7.el9_7.x86_64.rpm SHA-256: f2fdf7165e0f7524087bfb8313954f373836bab3d723752ddc896a5f0f100935
openssl-debugsource-3.5.1-7.el9_7.i686.rpm SHA-256: 20e79e7eedee66dea8f9d0ca64528b90e0449cfc879ab762a2f694951c703629
openssl-debugsource-3.5.1-7.el9_7.i686.rpm SHA-256: 20e79e7eedee66dea8f9d0ca64528b90e0449cfc879ab762a2f694951c703629
openssl-debugsource-3.5.1-7.el9_7.x86_64.rpm SHA-256: d0abcc15bc994bcc88f065753a11d3c33b511175ef260e002603e207441edfce
openssl-debugsource-3.5.1-7.el9_7.x86_64.rpm SHA-256: d0abcc15bc994bcc88f065753a11d3c33b511175ef260e002603e207441edfce
openssl-devel-3.5.1-7.el9_7.i686.rpm SHA-256: 9582fb75ef753a16de74faf6c45a3ff81614050e1e12da55a24d0ded946dbc07
openssl-devel-3.5.1-7.el9_7.x86_64.rpm SHA-256: 85e1a341adc784f4420742219e182f421655a5482aabe2b274445681747e1730
openssl-libs-3.5.1-7.el9_7.i686.rpm SHA-256: 9a4a29510f20df3c609a65c9f009f75a9555dcd5385af0b5324545d0f51060e9
openssl-libs-3.5.1-7.el9_7.x86_64.rpm SHA-256: 150962b6c8dbde0e36d11f5e7601130a2d4a9e40aa5e35cd5baa606e9d3f18b7
openssl-libs-debuginfo-3.5.1-7.el9_7.i686.rpm SHA-256: 9776f5f034824341b91e3b1b71355e49d5af3ff61b542bd33784f183ad20b31d
openssl-libs-debuginfo-3.5.1-7.el9_7.i686.rpm SHA-256: 9776f5f034824341b91e3b1b71355e49d5af3ff61b542bd33784f183ad20b31d
openssl-libs-debuginfo-3.5.1-7.el9_7.x86_64.rpm SHA-256: 055ae0ad3ac42d186b4b36c91601048358c02248247b1e89ecf7de48533d009f
openssl-libs-debuginfo-3.5.1-7.el9_7.x86_64.rpm SHA-256: 055ae0ad3ac42d186b4b36c91601048358c02248247b1e89ecf7de48533d009f
openssl-perl-3.5.1-7.el9_7.x86_64.rpm SHA-256: 9e72c02fc9a953b729ee97857a54f907f648710e58c81bf4f21133a4702550bf

Red Hat Enterprise Linux for IBM z Systems 9

SRPM
openssl-3.5.1-7.el9_7.src.rpm SHA-256: 6c9d66a1a6fe1b461d6e030f7b1f286555b83bdafcd14f90cd9d77f17f7177eb
s390x
openssl-3.5.1-7.el9_7.s390x.rpm SHA-256: 12d540f2ad34e2c202d47d3edff129acc324012a3946ef57cb1a5db8aad544a2
openssl-debuginfo-3.5.1-7.el9_7.s390x.rpm SHA-256: 8532b08aed8385c86cfe8c98c1360213fe31df73f96d2203b180dff02572bc16
openssl-debuginfo-3.5.1-7.el9_7.s390x.rpm SHA-256: 8532b08aed8385c86cfe8c98c1360213fe31df73f96d2203b180dff02572bc16
openssl-debugsource-3.5.1-7.el9_7.s390x.rpm SHA-256: 1a27f19c313fd3653910153c80da63c3b5107cf88cb70652b31066b81978a19c
openssl-debugsource-3.5.1-7.el9_7.s390x.rpm SHA-256: 1a27f19c313fd3653910153c80da63c3b5107cf88cb70652b31066b81978a19c
openssl-devel-3.5.1-7.el9_7.s390x.rpm SHA-256: c8d3dd29b240b782a39624632849a1401d4dc74b42e79e435e841cf22d65e853
openssl-libs-3.5.1-7.el9_7.s390x.rpm SHA-256: 51f30f99a5529a3413f13d5a2ddf41be7c06fc4528b842d320e6f68bb82e4b20
openssl-libs-debuginfo-3.5.1-7.el9_7.s390x.rpm SHA-256: 46f12671cdd6a782193e3a3c13466650385d95f9ae6e2af93bfb3eb2ff8a839e
openssl-libs-debuginfo-3.5.1-7.el9_7.s390x.rpm SHA-256: 46f12671cdd6a782193e3a3c13466650385d95f9ae6e2af93bfb3eb2ff8a839e
openssl-perl-3.5.1-7.el9_7.s390x.rpm SHA-256: 244fca4ff3d95dfaf2b6c7317d6e645860ce5db61c775cf371242527789e2388

Red Hat Enterprise Linux for Power, little endian 9

SRPM
openssl-3.5.1-7.el9_7.src.rpm SHA-256: 6c9d66a1a6fe1b461d6e030f7b1f286555b83bdafcd14f90cd9d77f17f7177eb
ppc64le
openssl-3.5.1-7.el9_7.ppc64le.rpm SHA-256: c5a5284070d6d182a4c93283039a327bf02efd41ab7ab4a748971421773ba605
openssl-debuginfo-3.5.1-7.el9_7.ppc64le.rpm SHA-256: 3bd3096fa5d9692f3ff9a94a4cb205183c27f77e9868ba39f5e61d2b2f85585d
openssl-debuginfo-3.5.1-7.el9_7.ppc64le.rpm SHA-256: 3bd3096fa5d9692f3ff9a94a4cb205183c27f77e9868ba39f5e61d2b2f85585d
openssl-debugsource-3.5.1-7.el9_7.ppc64le.rpm SHA-256: 95267b56666f7f2d287570e2840a50957a453a5d19b550fe0ccd28e615ec9fba
openssl-debugsource-3.5.1-7.el9_7.ppc64le.rpm SHA-256: 95267b56666f7f2d287570e2840a50957a453a5d19b550fe0ccd28e615ec9fba
openssl-devel-3.5.1-7.el9_7.ppc64le.rpm SHA-256: e80d9fa082234c8d941869ccbb7836761f7cc7c15a9211f56e8ad17fc79f4530
openssl-libs-3.5.1-7.el9_7.ppc64le.rpm SHA-256: 99dac7eb92b2cf3e4e2f512378397f59d206795e89bef3bb6891062e334fa65c
openssl-libs-debuginfo-3.5.1-7.el9_7.ppc64le.rpm SHA-256: aebb96c469f1ffdd5910e962b02870a7ef76c75f1b725c93248ec52ba9473b5b
openssl-libs-debuginfo-3.5.1-7.el9_7.ppc64le.rpm SHA-256: aebb96c469f1ffdd5910e962b02870a7ef76c75f1b725c93248ec52ba9473b5b
openssl-perl-3.5.1-7.el9_7.ppc64le.rpm SHA-256: 88766ab5bf2d03c2a8dcd129362ff5e0615575b4e3e2acfd2b23e8dd7ecd4ca5

Red Hat Enterprise Linux for ARM 64 9

SRPM
openssl-3.5.1-7.el9_7.src.rpm SHA-256: 6c9d66a1a6fe1b461d6e030f7b1f286555b83bdafcd14f90cd9d77f17f7177eb
aarch64
openssl-3.5.1-7.el9_7.aarch64.rpm SHA-256: fa672afb8e31cda4d155929f0e84efba28a925134fd3edacf822802c04e35b8d
openssl-debuginfo-3.5.1-7.el9_7.aarch64.rpm SHA-256: fcad8af66ccb580a03b28a409571ae6575176d26304ca99fa8d184966c261c8b
openssl-debuginfo-3.5.1-7.el9_7.aarch64.rpm SHA-256: fcad8af66ccb580a03b28a409571ae6575176d26304ca99fa8d184966c261c8b
openssl-debugsource-3.5.1-7.el9_7.aarch64.rpm SHA-256: 10dda19dc67f6d5b2bbd9f1142548aa2120b37d040aa8d35288ad28b0cfd0dbb
openssl-debugsource-3.5.1-7.el9_7.aarch64.rpm SHA-256: 10dda19dc67f6d5b2bbd9f1142548aa2120b37d040aa8d35288ad28b0cfd0dbb
openssl-devel-3.5.1-7.el9_7.aarch64.rpm SHA-256: d9e2b9611a355580f0010beaee8aa9ca649b5c00225812c30be340b220a7e158
openssl-libs-3.5.1-7.el9_7.aarch64.rpm SHA-256: 5a659a77448de7221c58e25cf3474c49f2d80e2b96ef18c8807bd80d82fcf167
openssl-libs-debuginfo-3.5.1-7.el9_7.aarch64.rpm SHA-256: 09c0852cca66e7d5d5f294213eb82fcb0fb72395a8b17b23ffd373329d90ffbf
openssl-libs-debuginfo-3.5.1-7.el9_7.aarch64.rpm SHA-256: 09c0852cca66e7d5d5f294213eb82fcb0fb72395a8b17b23ffd373329d90ffbf
openssl-perl-3.5.1-7.el9_7.aarch64.rpm SHA-256: 873785211823eabed1f83ec4791973ed807b8a1b7b6735cf21acd8d0fe12609c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility