Security update for openssl-3
| Announcement ID: | SUSE-SU-2026:20211-1 |
|---|---|
| Release Date: | 2026-02-02T13:05:58Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 12 vulnerabilities and has one fix can now be installed.
Description:
This update for openssl-3 fixes the following issues:
Security fixes:
- CVE-2025-11187: Improper validation of PBMAC1 parameters in PKCS#12 MAC verification (bsc#1256829).
- CVE-2025-15467: Stack buffer overflow in CMS AuthEnvelopedData parsing (bsc#1256830).
- CVE-2025-15468: NULL dereference in SSL_CIPHER_find() function on unknown cipher ID (bsc#1256831).
- CVE-2025-15469: "openssl dgst" one-shot codepath silently truncates inputs >16MB (bsc#1256832).
- CVE-2025-66199: TLS 1.3 CompressedCertificate excessive memory allocation (bsc#1256833).
- CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes (bsc#1256834).
- CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (bsc#1256835).
- CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (bsc#1256836).
- CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response() function (bsc#1256837).
- CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (bsc#1256838).
- CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing (bsc#1256839).
- CVE-2026-22796: ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (bsc#1256840).
Other fixes:
- Enable livepatching support for ppc64le (bsc#1257274).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Micro 6.2
zypper in -t patch SUSE-SL-Micro-6.2-237=1
Package List:
-
SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64)
- libopenssl3-debuginfo-3.5.0-160000.5.1
- libopenssl3-3.5.0-160000.5.1
- libopenssl-3-fips-provider-debuginfo-3.5.0-160000.5.1
- openssl-3-3.5.0-160000.5.1
- openssl-3-debugsource-3.5.0-160000.5.1
- openssl-3-debuginfo-3.5.0-160000.5.1
- libopenssl-3-fips-provider-3.5.0-160000.5.1
- libopenssl-3-devel-3.5.0-160000.5.1
References:
- https://www.suse.com/security/cve/CVE-2025-11187.html
- https://www.suse.com/security/cve/CVE-2025-15467.html
- https://www.suse.com/security/cve/CVE-2025-15468.html
- https://www.suse.com/security/cve/CVE-2025-15469.html
- https://www.suse.com/security/cve/CVE-2025-66199.html
- https://www.suse.com/security/cve/CVE-2025-68160.html
- https://www.suse.com/security/cve/CVE-2025-69418.html
- https://www.suse.com/security/cve/CVE-2025-69419.html
- https://www.suse.com/security/cve/CVE-2025-69420.html
- https://www.suse.com/security/cve/CVE-2025-69421.html
- https://www.suse.com/security/cve/CVE-2026-22795.html
- https://www.suse.com/security/cve/CVE-2026-22796.html
- https://bugzilla.suse.com/show_bug.cgi?id=1256829
- https://bugzilla.suse.com/show_bug.cgi?id=1256830
- https://bugzilla.suse.com/show_bug.cgi?id=1256831
- https://bugzilla.suse.com/show_bug.cgi?id=1256832
- https://bugzilla.suse.com/show_bug.cgi?id=1256833
- https://bugzilla.suse.com/show_bug.cgi?id=1256834
- https://bugzilla.suse.com/show_bug.cgi?id=1256835
- https://bugzilla.suse.com/show_bug.cgi?id=1256836
- https://bugzilla.suse.com/show_bug.cgi?id=1256837
- https://bugzilla.suse.com/show_bug.cgi?id=1256838
- https://bugzilla.suse.com/show_bug.cgi?id=1256839
- https://bugzilla.suse.com/show_bug.cgi?id=1256840
- https://bugzilla.suse.com/show_bug.cgi?id=1257274