SUSE-SU-2026:20345-1: moderate: Security update for openCryptoki

SLE-SECURITY-UPDATES null at suse.de
Mon Feb 16 20:30:05 UTC 2026



# Security update for openCryptoki

Announcement ID: SUSE-SU-2026:20345-1  
Release Date: 2026-02-13T17:42:31Z  
Rating: moderate  
References:

  * bsc#1256673
  * bsc#1257116
  * jsc#PED-14609
  * jsc#PED-14798

  
Cross-References:

  * CVE-2026-22791
  * CVE-2026-23893

  
CVSS scores:

  * CVE-2026-22791 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22791 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2026-22791 ( NVD ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2026-22791 ( NVD ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2026-23893 ( SUSE ):  6.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
  * CVE-2026-23893 ( NVD ):  6.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L

  
Affected Products:

  * SUSE Linux Micro 6.2

  
  
An update that solves two vulnerabilities and contains two features can now be
installed.

## Description:

This update for openCryptoki fixes the following issues:

Upgrade openCryptoki to 3.26 (jsc#PED-14609)

Security fixes:

  * CVE-2026-22791: supplying malformed compressed EC public key can lead to
    heap corruption or denial-of-service (bsc#1256673).
  * CVE-2026-23893: Privilege Escalation or Data Exposure via Symlink Following
    (bsc#1257116).

Other fixes:

  * Soft: Add support for RSA keys up to 16K bits.
  * CCA: Add support for RSA keys up to 8K bits (requires CCA v8.4 or v7.6 or
    later).
  * p11sak: Add support for generating RSA keys up to 16K bits.
  * Soft/ICA: Add support for SHA512/224 and SHA512/256 key derivation mechanism
    (CKM_SHA512_224_KEY_DERIVATION and CKM_SHA512_256_KEY_DERIVATION).
  * Soft/ICA/CCA/EP11: Add support for SHA-HMAC key types CKK_SHAxxx_HMAC and
    key gen mechanisms CKM_SHAxxx_KEY_GEN.
  * p11sak: Add support for SHA-HMAC key types and key generation.
  * p11sak: Add support for key wrap and unwrap commands to export and import
    private and secret keys by means of key wrapping/unwrapping with various key
    wrapping mechanism.
  * p11kmip: Add support for using an HSM-protected TLS client key via a PKCS#11
    provider.
  * p11sak: Add support for exporting non-sensitive private keys to password
    protected PEM files.
  * Add support for canceling an operation via NULL mechanism pointer at
    C_XxxInit() call as an alternative to C_SessionCancel() (PKCS#11 v3.0).
  * EP11: Add support for pairing friendly BLS12-381 EC curve for sign/verify
    using CKM_IBM_ECDSA_OTHER and signature/public key aggregation using
    CKM_IBM_EC_AGGREGATE.
  * p11sak: Add support for generating BLS12-381 EC keys.
  * EP11: Add support for IBM-specific ML-DSA and ML-KEM key types and
    mechanisms (requires an EP11 host library v4.2 or later, and a CEX8P crypto
    card with firmware v9.6 or later on IBM z17, and v8.39 or later on IBM z16).
  * CCA: Add support for IBM-specific ML-DSA and ML-KEM key types and mechanisms
    (requires CCA v8.4 or later).
  * Soft: Add support for IBM-specific ML-DSA and ML-KEM key types and
    mechanisms (requires OpenSSL 3.5 or later, or the OQS-provider must be
    configured).
  * p11sak: Add support for IBM-specific ML-DSA and ML-KEM key types.
  * Bug fixes.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Micro 6.2  
    zypper in -t patch SUSE-SL-Micro-6.2-284=1

## Package List:

  * SUSE Linux Micro 6.2 (s390x)
    * openCryptoki-debuginfo-3.26.0-160000.1.1
    * openCryptoki-3.26.0-160000.1.1
    * openCryptoki-debugsource-3.26.0-160000.1.1

## References:

  * https://www.suse.com/security/cve/CVE-2026-22791.html
  * https://www.suse.com/security/cve/CVE-2026-23893.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1256673
  * https://bugzilla.suse.com/show_bug.cgi?id=1257116
  * https://jira.suse.com/browse/PED-14609
  * https://jira.suse.com/browse/PED-14798

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20260216/abb2d76f/attachment.htm>


More information about the sle-security-updates mailing list