SUSE-SU-2026:20434-1: moderate: Security update for openCryptoki
SLE-SECURITY-UPDATES
null at suse.de
Wed Feb 18 16:30:35 UTC 2026
# Security update for openCryptoki
Announcement ID: SUSE-SU-2026:20434-1
Release Date: 2026-02-13T17:42:04Z
Rating: moderate
References:
* bsc#1256673
* bsc#1257116
* jsc#PED-14609
* jsc#PED-14798
Cross-References:
* CVE-2026-22791
* CVE-2026-23893
CVSS scores:
* CVE-2026-22791 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22791 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-22791 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-22791 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-23893 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
* CVE-2026-23893 ( NVD ): 6.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
Affected Products:
* SUSE Linux Enterprise Server 16.0
* SUSE Linux Enterprise Server for SAP Applications 16.0
An update that solves two vulnerabilities and contains two features can now be
installed.
## Description:
This update for openCryptoki fixes the following issues:
Upgrade openCryptoki to 3.26 (jsc#PED-14609)
Security fixes:
* CVE-2026-22791: supplying malformed compressed EC public key can lead to
heap corruption or denial-of-service (bsc#1256673).
* CVE-2026-23893: Privilege Escalation or Data Exposure via Symlink Following
(bsc#1257116).
Other fixes:
* Soft: Add support for RSA keys up to 16K bits.
* CCA: Add support for RSA keys up to 8K bits (requires CCA v8.4 or v7.6 or
later).
* p11sak: Add support for generating RSA keys up to 16K bits.
* Soft/ICA: Add support for SHA512/224 and SHA512/256 key derivation mechanism
(CKM_SHA512_224_KEY_DERIVATION and CKM_SHA512_256_KEY_DERIVATION).
* Soft/ICA/CCA/EP11: Add support for SHA-HMAC key types CKK_SHAxxx_HMAC and
key gen mechanisms CKM_SHAxxx_KEY_GEN.
* p11sak: Add support for SHA-HMAC key types and key generation.
* p11sak: Add support for key wrap and unwrap commands to export and import
private and secret keys by means of key wrapping/unwrapping with various key
wrapping mechanism.
* p11kmip: Add support for using an HSM-protected TLS client key via a PKCS#11
provider.
* p11sak: Add support for exporting non-sensitive private keys to password
protected PEM files.
* Add support for canceling an operation via NULL mechanism pointer at
C_XxxInit() call as an alternative to C_SessionCancel() (PKCS#11 v3.0).
* EP11: Add support for pairing friendly BLS12-381 EC curve for sign/verify
using CKM_IBM_ECDSA_OTHER and signature/public key aggregation using
CKM_IBM_EC_AGGREGATE.
* p11sak: Add support for generating BLS12-381 EC keys.
* EP11: Add support for IBM-specific ML-DSA and ML-KEM key types and
mechanisms (requires an EP11 host library v4.2 or later, and a CEX8P crypto
card with firmware v9.6 or later on IBM z17, and v8.39 or later on IBM z16).
* CCA: Add support for IBM-specific ML-DSA and ML-KEM key types and mechanisms
(requires CCA v8.4 or later).
* Soft: Add support for IBM-specific ML-DSA and ML-KEM key types and
mechanisms (requires OpenSSL 3.5 or later, or the OQS-provider must be
configured).
* p11sak: Add support for IBM-specific ML-DSA and ML-KEM key types.
* Bug fixes.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 16.0
zypper in -t patch SUSE-SLES-16.0-284=1
* SUSE Linux Enterprise Server for SAP Applications 16.0
zypper in -t patch SUSE-SLES-16.0-284=1
## Package List:
* SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64)
* openCryptoki-debuginfo-3.26.0-160000.1.1
* openCryptoki-debugsource-3.26.0-160000.1.1
* openCryptoki-64bit-debuginfo-3.26.0-160000.1.1
* openCryptoki-devel-3.26.0-160000.1.1
* openCryptoki-64bit-3.26.0-160000.1.1
* openCryptoki-3.26.0-160000.1.1
* SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64)
* openCryptoki-debuginfo-3.26.0-160000.1.1
* openCryptoki-debugsource-3.26.0-160000.1.1
* openCryptoki-64bit-debuginfo-3.26.0-160000.1.1
* openCryptoki-devel-3.26.0-160000.1.1
* openCryptoki-64bit-3.26.0-160000.1.1
* openCryptoki-3.26.0-160000.1.1
## References:
* https://www.suse.com/security/cve/CVE-2026-22791.html
* https://www.suse.com/security/cve/CVE-2026-23893.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256673
* https://bugzilla.suse.com/show_bug.cgi?id=1257116
* https://jira.suse.com/browse/PED-14609
* https://jira.suse.com/browse/PED-14798
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20260218/f6ec44d3/attachment.htm>
More information about the sle-security-updates
mailing list