SUSE-SU-2026:21393-1: moderate: Security update for libsodium

SLE-SECURITY-UPDATES null at suse.de
Thu Apr 30 16:30:31 UTC 2026



# Security update for libsodium

Announcement ID: SUSE-SU-2026:21393-1  
Release Date: 2026-04-28T15:27:44Z  
Rating: moderate  
References:

  * bsc#1255764
  * bsc#1256070

  
Cross-References:

  * CVE-2025-15444
  * CVE-2025-69277

  
CVSS scores:

  * CVE-2025-15444 ( SUSE ):  6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
  * CVE-2025-15444 ( NVD ):  9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-69277 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-69277 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
  * CVE-2025-69277 ( NVD ):  4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N

  
Affected Products:

  * SUSE Linux Micro 6.2

  
  
An update that solves two vulnerabilities can now be installed.

## Description:

This update for libsodium fixes the following issues:

Security fixes:

  * CVE-2025-15444: Cryptographic bypass via improper elliptic curve point
    validation (bsc#1256070).
  * CVE-2025-69277: incorrect validation of elliptic curve points certain custom
    cryptography or untrusted data to crypto_core_ed25519_is_valid_point
    function (bsc#1255764).

Other fixes:

  * Update to 1.0.21
  * The new crypto_ipcrypt_* functions implement mechanisms for securely
    encrypting and anonymizing IP addresses.
  * The sodium_bin2ip and sodium_ip2bin helper functions have been added to
    complement the crypto_ipcrypt_* functions and easily convert addresses
    between bytes and strings.
  * XOF: the crypto_xof_shake _and crypto_xof_turboshake_ functions are
  * standard extendable output functions. From input of any length, they can
    derive output of any length with the same properties as hash functions.
    These primitives are required by many post-quantum mechanisms, but can also
    be used for a wide range of applications, including key derivation, session
    encryption and more.
  * Performance of AES256-GCM and AEGIS on ARM has been improved with some
    compilers
  * Security: optblockers have been introduced in critical code paths to prevent
    compilers from introducing unwanted side channels via conditional jumps.
    This was observed on RISC-V targets with specific compilers and options.
  * Security: crypto_core_ed25519_is_valid_point() now properly rejects small-
    order points that are not in the main subgroup
  * ((nonnull)) attributes have been relaxed on some crypto_stream* functions to
    allow NULL output buffers when the output length is zero
  * A cross-compilation issue with old clang versions has been fixed
  * crypto_aead_aes256gcm_is_available is exported to JavaScript
  * Security: memory fences have been added after MAC verification in AEAD to
    prevent speculative access to plaintext before authentication is complete
  * Assembly files now include .gnu.property notes for proper IBT and Shadow
    Stack support when building with CET instrumentation.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Micro 6.2  
    zypper in -t patch SUSE-SL-Micro-6.2-649=1

## Package List:

  * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64)
    * libsodium26-debuginfo-1.0.21-160000.1.1
    * libsodium26-1.0.21-160000.1.1
    * libsodium-debugsource-1.0.21-160000.1.1

## References:

  * https://www.suse.com/security/cve/CVE-2025-15444.html
  * https://www.suse.com/security/cve/CVE-2025-69277.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1255764
  * https://bugzilla.suse.com/show_bug.cgi?id=1256070

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20260430/fe5c8827/attachment.htm>


More information about the sle-security-updates mailing list