Security update for openCryptoki
| Announcement ID: | SUSE-SU-2026:20434-1 |
|---|---|
| Release Date: | 2026-02-13T17:42:04Z |
| Rating: | moderate |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves two vulnerabilities and contains two features can now be installed.
Description:
This update for openCryptoki fixes the following issues:
Upgrade openCryptoki to 3.26 (jsc#PED-14609)
Security fixes:
- CVE-2026-22791: supplying malformed compressed EC public key can lead to heap corruption or denial-of-service (bsc#1256673).
- CVE-2026-23893: Privilege Escalation or Data Exposure via Symlink Following (bsc#1257116).
Other fixes:
- Soft: Add support for RSA keys up to 16K bits.
- CCA: Add support for RSA keys up to 8K bits (requires CCA v8.4 or v7.6 or later).
- p11sak: Add support for generating RSA keys up to 16K bits.
- Soft/ICA: Add support for SHA512/224 and SHA512/256 key derivation mechanism (CKM_SHA512_224_KEY_DERIVATION and CKM_SHA512_256_KEY_DERIVATION).
- Soft/ICA/CCA/EP11: Add support for SHA-HMAC key types CKK_SHAxxx_HMAC and key gen mechanisms CKM_SHAxxx_KEY_GEN.
- p11sak: Add support for SHA-HMAC key types and key generation.
- p11sak: Add support for key wrap and unwrap commands to export and import private and secret keys by means of key wrapping/unwrapping with various key wrapping mechanism.
- p11kmip: Add support for using an HSM-protected TLS client key via a PKCS#11 provider.
- p11sak: Add support for exporting non-sensitive private keys to password protected PEM files.
- Add support for canceling an operation via NULL mechanism pointer at C_XxxInit() call as an alternative to C_SessionCancel() (PKCS#11 v3.0).
- EP11: Add support for pairing friendly BLS12-381 EC curve for sign/verify using CKM_IBM_ECDSA_OTHER and signature/public key aggregation using CKM_IBM_EC_AGGREGATE.
- p11sak: Add support for generating BLS12-381 EC keys.
- EP11: Add support for IBM-specific ML-DSA and ML-KEM key types and mechanisms (requires an EP11 host library v4.2 or later, and a CEX8P crypto card with firmware v9.6 or later on IBM z17, and v8.39 or later on IBM z16).
- CCA: Add support for IBM-specific ML-DSA and ML-KEM key types and mechanisms (requires CCA v8.4 or later).
- Soft: Add support for IBM-specific ML-DSA and ML-KEM key types and mechanisms (requires OpenSSL 3.5 or later, or the OQS-provider must be configured).
- p11sak: Add support for IBM-specific ML-DSA and ML-KEM key types.
- Bug fixes.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 16.0
zypper in -t patch SUSE-SLES-16.0-284=1 -
SUSE Linux Enterprise Server for SAP Applications 16.0
zypper in -t patch SUSE-SLES-16.0-284=1
Package List:
-
SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64)
- openCryptoki-debuginfo-3.26.0-160000.1.1
- openCryptoki-debugsource-3.26.0-160000.1.1
- openCryptoki-64bit-debuginfo-3.26.0-160000.1.1
- openCryptoki-devel-3.26.0-160000.1.1
- openCryptoki-64bit-3.26.0-160000.1.1
- openCryptoki-3.26.0-160000.1.1
-
SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64)
- openCryptoki-debuginfo-3.26.0-160000.1.1
- openCryptoki-debugsource-3.26.0-160000.1.1
- openCryptoki-64bit-debuginfo-3.26.0-160000.1.1
- openCryptoki-devel-3.26.0-160000.1.1
- openCryptoki-64bit-3.26.0-160000.1.1
- openCryptoki-3.26.0-160000.1.1