SUSE-SU-2026:20434-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-202620434-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20434-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2026:20434-1
Upstream
Related
Published
2026-02-13T17:44:22Z
Modified
2026-03-23T04:52:55.098185Z
Summary
Security update for openCryptoki
Details

This update for openCryptoki fixes the following issues:

Upgrade openCryptoki to 3.26 (jsc#PED-14609)

Security fixes:

  • CVE-2026-22791: supplying malformed compressed EC public key can lead to heap corruption or denial-of-service (bsc#1256673).
  • CVE-2026-23893: Privilege Escalation or Data Exposure via Symlink Following (bsc#1257116).

Other fixes:

  • Soft: Add support for RSA keys up to 16K bits.
  • CCA: Add support for RSA keys up to 8K bits (requires CCA v8.4 or v7.6 or later).
  • p11sak: Add support for generating RSA keys up to 16K bits.
  • Soft/ICA: Add support for SHA512/224 and SHA512/256 key derivation mechanism (CKMSHA512224KEYDERIVATION and CKMSHA512256KEYDERIVATION).
  • Soft/ICA/CCA/EP11: Add support for SHA-HMAC key types CKKSHAxxxHMAC and key gen mechanisms CKMSHAxxxKEY_GEN.
  • p11sak: Add support for SHA-HMAC key types and key generation.
  • p11sak: Add support for key wrap and unwrap commands to export and import private and secret keys by means of key wrapping/unwrapping with various key wrapping mechanism.
  • p11kmip: Add support for using an HSM-protected TLS client key via a PKCS#11 provider.
  • p11sak: Add support for exporting non-sensitive private keys to password protected PEM files.
  • Add support for canceling an operation via NULL mechanism pointer at CXxxInit() call as an alternative to CSessionCancel() (PKCS#11 v3.0).
  • EP11: Add support for pairing friendly BLS12-381 EC curve for sign/verify using CKMIBMECDSAOTHER and signature/public key aggregation using CKMIBMECAGGREGATE.
  • p11sak: Add support for generating BLS12-381 EC keys.
  • EP11: Add support for IBM-specific ML-DSA and ML-KEM key types and mechanisms (requires an EP11 host library v4.2 or later, and a CEX8P crypto card with firmware v9.6 or later on IBM z17, and v8.39 or later on IBM z16).
  • CCA: Add support for IBM-specific ML-DSA and ML-KEM key types and mechanisms (requires CCA v8.4 or later).
  • Soft: Add support for IBM-specific ML-DSA and ML-KEM key types and mechanisms (requires OpenSSL 3.5 or later, or the OQS-provider must be configured).
  • p11sak: Add support for IBM-specific ML-DSA and ML-KEM key types.
  • Bug fixes.
References

Affected packages

SUSE:Linux Enterprise Server 16.0 / openCryptoki

Package

Name
openCryptoki
Purl
pkg:rpm/suse/openCryptoki&distro=SUSE%20Linux%20Enterprise%20Server%2016.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.26.0-160000.1.1

Ecosystem specific

{
    "binaries": [
        {
            "openCryptoki-64bit": "3.26.0-160000.1.1",
            "openCryptoki-devel": "3.26.0-160000.1.1",
            "openCryptoki": "3.26.0-160000.1.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20434-1.json"

SUSE:Linux Enterprise Server for SAP applications 16.0 / openCryptoki

Package

Name
openCryptoki
Purl
pkg:rpm/suse/openCryptoki&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20applications%2016.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.26.0-160000.1.1

Ecosystem specific

{
    "binaries": [
        {
            "openCryptoki-64bit": "3.26.0-160000.1.1",
            "openCryptoki-devel": "3.26.0-160000.1.1",
            "openCryptoki": "3.26.0-160000.1.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20434-1.json"