<div class="container">
<h1>Security update for openCryptoki</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2026:20345-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2026-02-13T17:42:31Z</td>
</tr>
<tr>
<th>Rating:</th>
<td>moderate</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1256673">bsc#1256673</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1257116">bsc#1257116</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-14609">jsc#PED-14609</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-14798">jsc#PED-14798</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2026-22791.html">CVE-2026-22791</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2026-23893.html">CVE-2026-23893</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2026-22791</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.9</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2026-22791</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2026-22791</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2026-22791</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2026-23893</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2026-23893</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">SUSE Linux Micro 6.2</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves two vulnerabilities and contains two features can now be installed.</p>
<h2>Description:</h2>
<p>This update for openCryptoki fixes the following issues:</p>
<p>Upgrade openCryptoki to 3.26 (jsc#PED-14609)</p>
<p>Security fixes:</p>
<ul>
<li>CVE-2026-22791: supplying malformed compressed EC public key can lead to heap corruption or denial-of-service (bsc#1256673).</li>
<li>CVE-2026-23893: Privilege Escalation or Data Exposure via Symlink Following (bsc#1257116).</li>
</ul>
<p>Other fixes:</p>
<ul>
<li>Soft: Add support for RSA keys up to 16K bits.</li>
<li>CCA: Add support for RSA keys up to 8K bits (requires CCA v8.4 or v7.6 or later).</li>
<li>p11sak: Add support for generating RSA keys up to 16K bits.</li>
<li>Soft/ICA: Add support for SHA512/224 and SHA512/256 key derivation mechanism (CKM_SHA512_224_KEY_DERIVATION and CKM_SHA512_256_KEY_DERIVATION).</li>
<li>Soft/ICA/CCA/EP11: Add support for SHA-HMAC key types CKK_SHAxxx_HMAC and key gen mechanisms CKM_SHAxxx_KEY_GEN.</li>
<li>p11sak: Add support for SHA-HMAC key types and key generation.</li>
<li>p11sak: Add support for key wrap and unwrap commands to export and import private and secret keys by means of key wrapping/unwrapping
with various key wrapping mechanism.</li>
<li>p11kmip: Add support for using an HSM-protected TLS client key via a PKCS#11 provider.</li>
<li>p11sak: Add support for exporting non-sensitive private keys to password protected PEM files.</li>
<li>Add support for canceling an operation via NULL mechanism pointer at C_XxxInit() call as an alternative to C_SessionCancel() (PKCS#11 v3.0).</li>
<li>EP11: Add support for pairing friendly BLS12-381 EC curve for sign/verify using CKM_IBM_ECDSA_OTHER and signature/public key aggregation using CKM_IBM_EC_AGGREGATE.</li>
<li>p11sak: Add support for generating BLS12-381 EC keys.</li>
<li>EP11: Add support for IBM-specific ML-DSA and ML-KEM key types and mechanisms (requires an EP11 host library v4.2 or later, and
a CEX8P crypto card with firmware v9.6 or later on IBM z17, and v8.39 or later on IBM z16).</li>
<li>CCA: Add support for IBM-specific ML-DSA and ML-KEM key types and mechanisms (requires CCA v8.4 or later).</li>
<li>Soft: Add support for IBM-specific ML-DSA and ML-KEM key types and mechanisms (requires OpenSSL 3.5 or later, or the OQS-provider must be configured).</li>
<li>p11sak: Add support for IBM-specific ML-DSA and ML-KEM key types.</li>
<li>Bug fixes.</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
SUSE Linux Micro 6.2
<br/>
<code>zypper in -t patch SUSE-SL-Micro-6.2-284=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
SUSE Linux Micro 6.2 (s390x)
<ul>
<li>openCryptoki-debuginfo-3.26.0-160000.1.1</li>
<li>openCryptoki-3.26.0-160000.1.1</li>
<li>openCryptoki-debugsource-3.26.0-160000.1.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2026-22791.html">https://www.suse.com/security/cve/CVE-2026-22791.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2026-23893.html">https://www.suse.com/security/cve/CVE-2026-23893.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1256673">https://bugzilla.suse.com/show_bug.cgi?id=1256673</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1257116">https://bugzilla.suse.com/show_bug.cgi?id=1257116</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-14609">https://jira.suse.com/browse/PED-14609</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-14798">https://jira.suse.com/browse/PED-14798</a>
</li>
</ul>
</div>