[CLSA-2026:1770668132] openssl: Fix of 2 CVEs
Type:
security
Severity:
Critical
Release date:
2026-02-09 20:15:36 UTC
Description:
- CVE-2025-69418: fix OCB AES-NI/HW stream path leaving trailing bytes unauthenticated/unencrypted by advancing pointers after stream processing - CVE-2025-69420: fix missing ASN1_TYPE validation in TS_RESP_verify_response for signing certificate attributes
Updated packages:
  • openssl-3.0.7-20.el9_2.tuxcare.1.els8.x86_64.rpm
    sha:7effa956073636bf8a3bdb6c618e82faf04bec21ccc19d9ca3eb35a1dec12786
  • openssl-devel-3.0.7-20.el9_2.tuxcare.1.els8.i686.rpm
    sha:38e5c5800bdf107189f92356c3048ff59247296a2ad5c2847f2ded5c5d75eed4
  • openssl-devel-3.0.7-20.el9_2.tuxcare.1.els8.x86_64.rpm
    sha:8511a7044a49353978058f9346a74b24113827c5ff6f29549a593a85aede3228
  • openssl-libs-3.0.7-20.el9_2.tuxcare.1.els8.i686.rpm
    sha:508714d11f5a42ef0d3dd14b104f83acc60da99f29ffb34fb55897310be94f18
  • openssl-libs-3.0.7-20.el9_2.tuxcare.1.els8.x86_64.rpm
    sha:717875d8a0cb2c25f9be42c9445ed940eeff1f78b49f340eaf2f3df3676fb4e9
  • openssl-perl-3.0.7-20.el9_2.tuxcare.1.els8.x86_64.rpm
    sha:9443ab174f3e0d8a8809d785e507e3e2e0c6cf4fceb5370f487d925dfae06fd1
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.