Openssl Red Hat Openssl

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Red Hat Openssl.

Recent Red Hat Openssl Security Advisories

Advisory Title Published
RHSA-2026:5217 (RHSA-2026:5217) Moderate: compat-openssl11 security update March 23, 2026
RHSA-2026:5214 (RHSA-2026:5214) Moderate: compat-openssl11 security update March 23, 2026
RHSA-2026:4825 (RHSA-2026:4825) Moderate: compat-openssl11 security update March 17, 2026
RHSA-2026:4824 (RHSA-2026:4824) Moderate: compat-openssl11 security update March 17, 2026
RHSA-2026:4472 (RHSA-2026:4472) Moderate: compat-openssl11 security update March 12, 2026
RHSA-2026:4214 (RHSA-2026:4214) Moderate: openssl security update March 10, 2026
RHSA-2026:4163 (RHSA-2026:4163) Moderate: openssl security update March 10, 2026
RHSA-2026:3437 (RHSA-2026:3437) Moderate: openssl security update February 26, 2026
RHSA-2026:3364 (RHSA-2026:3364) Moderate: openssl security update February 25, 2026
RHSA-2026:3042 (RHSA-2026:3042) Moderate: openssl security update February 23, 2026

EOL Dates

Ensure that you are using a supported version of Red Hat Openssl. Here are some end of life, and end of support dates for Red Hat Openssl.

Release EOL Date Status
3.6 November 1, 2026
EOL This Year

Red Hat Openssl 3.6 will become EOL this year, in November 2026.

3.5 April 8, 2030
Active

Red Hat Openssl 3.5 will become EOL in 4 years (in 2030).

3.4 October 22, 2026
EOL This Year

Red Hat Openssl 3.4 will become EOL this year, in October 2026.

3.3 April 9, 2026
EOL This Year

Red Hat Openssl 3.3 will become EOL this year, in April 2026.

3.2 November 23, 2025
EOL

Red Hat Openssl 3.2 became EOL in 2025.

3.1 March 14, 2025
EOL

Red Hat Openssl 3.1 became EOL in 2025.

3.0 September 7, 2026
EOL This Year

Red Hat Openssl 3.0 will become EOL this year, in September 2026.

1.1.1 September 11, 2023
EOL

Red Hat Openssl 1.1.1 became EOL in 2023.

1.1.0 September 11, 2019
EOL

Red Hat Openssl 1.1.0 became EOL in 2019.

1.0.2 December 31, 2019
EOL

Red Hat Openssl 1.0.2 became EOL in 2019.

1.0.1 December 31, 2016
EOL

Red Hat Openssl 1.0.1 became EOL in 2016.

1.0.0 December 31, 2015
EOL

Red Hat Openssl 1.0.0 became EOL in 2015.

0.9.8 December 31, 2015
EOL

Red Hat Openssl 0.9.8 became EOL in 2015.

By the Year

In 2026 there have been 0 vulnerabilities in Red Hat Openssl. Openssl did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 1 5.90

It may take a day or so for new Openssl vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Red Hat Openssl Security Vulnerabilities

Perl Crypt-OpenSSL-RSA PKCS#1 v1.5 Timing Side-Channel (Bleichenbacher)
CVE-2024-2467 5.9 - Medium - April 25, 2024

A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.

Observable Timing Discrepancy

The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2
CVE-2009-1387 - June 04, 2009

The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."

NULL Pointer Dereference

ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet
CVE-2009-1386 - June 04, 2009

ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.

NULL Pointer Dereference

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Red Hat Openssl or by Red Hat? Click the Watch button to subscribe.

Red Hat
Vendor

subscribe