SUSE-SU-2026:21419-1

Vulnerability from csaf_suse - Published: 2026-04-28 10:44 - Updated: 2026-04-28 10:44
Summary
Security update for openCryptoki
Severity
Moderate
Notes
Title of the patch: Security update for openCryptoki
Description of the patch: This update for openCryptoki fixes the following issues: - CVE-2026-23893: use of symlinks in group-writable token directories can lead to privilege escalation and data exposure (bsc#1257116). - CVE-2026-40253: malformed BER-encoded cryptographic objects can lead to information disclosure and denial of service (bsc#1262283).
Patchnames: SUSE-SLE-Micro-6.0-689
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for openCryptoki",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for openCryptoki fixes the following issues:\n\n- CVE-2026-23893: use of symlinks in group-writable token directories can lead to privilege escalation and data\n  exposure (bsc#1257116).\n- CVE-2026-40253: malformed BER-encoded cryptographic objects can lead to information disclosure and denial of service\n  (bsc#1262283).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-SLE-Micro-6.0-689",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21419-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2026:21419-1",
        "url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621419-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2026:21419-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2026-April/046117.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1248002",
        "url": "https://bugzilla.suse.com/1248002"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1257116",
        "url": "https://bugzilla.suse.com/1257116"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1262283",
        "url": "https://bugzilla.suse.com/1262283"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-23893 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-23893/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-40253 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-40253/"
      }
    ],
    "title": "Security update for openCryptoki",
    "tracking": {
      "current_release_date": "2026-04-28T10:44:27Z",
      "generator": {
        "date": "2026-04-28T10:44:27Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2026:21419-1",
      "initial_release_date": "2026-04-28T10:44:27Z",
      "revision_history": [
        {
          "date": "2026-04-28T10:44:27Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openCryptoki-3.23.0-2.1.s390x",
                "product": {
                  "name": "openCryptoki-3.23.0-2.1.s390x",
                  "product_id": "openCryptoki-3.23.0-2.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Micro 6.0",
                "product": {
                  "name": "SUSE Linux Micro 6.0",
                  "product_id": "SUSE Linux Micro 6.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sl-micro:6.0"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openCryptoki-3.23.0-2.1.s390x as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openCryptoki-3.23.0-2.1.s390x"
        },
        "product_reference": "openCryptoki-3.23.0-2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-23893",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-23893"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "openCryptoki is a PKCS#11 library and provides tooling for Linux and AIX. Versions 2.3.2 and above are vulnerable to symlink-following when running in privileged contexts. A token-group user can redirect file operations to arbitrary filesystem targets by planting symlinks in group-writable token directories, resulting in privilege escalation or data exposure. Token and lock directories are 0770 (group-writable for token users), so any token-group member can plant files and symlinks inside them. When run as root, the base code handling token directory file access, as well as several openCryptoki tools used for administrative purposes, may reset ownership or permissions on existing files inside the token directories. An attacker with token-group membership can exploit the system when an administrator runs a PKCS#11 application or administrative tool that performs chown on files inside the token directory during normal maintenance. This issue is fixed in commit 5e6e4b4, but has not been included in a released version at the time of publication.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:openCryptoki-3.23.0-2.1.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-23893",
          "url": "https://www.suse.com/security/cve/CVE-2026-23893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257116 for CVE-2026-23893",
          "url": "https://bugzilla.suse.com/1257116"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:openCryptoki-3.23.0-2.1.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:openCryptoki-3.23.0-2.1.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-28T10:44:27Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-23893"
    },
    {
      "cve": "CVE-2026-40253",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-40253"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "openCryptoki is a PKCS#11 library and provides tooling for Linux and AIX. In versions 3.26.0 and below, the BER/DER decoding functions in the shared common library (asn1.c) accept a raw pointer but no buffer length parameter, and trust attacker-controlled BER length fields without validating them against actual buffer boundaries. All primitive decoders are affected: ber_decode_INTEGER, ber_decode_SEQUENCE, ber_decode_OCTET_STRING, ber_decode_BIT_STRING, and ber_decode_CHOICE. Additionally, ber_decode_INTEGER can produce integer underflows when the encoded length is zero. An attacker supplying a malformed BER-encoded cryptographic object through PKCS#11 operations such as C_CreateObject or C_UnwrapKey, token loading from disk, or remote backend communication can trigger out-of-bounds reads. This affects all token backends (Soft, ICA, CCA, TPM, EP11, ICSF) since the vulnerable code is in the shared common library. A patch is available thorugh commit ed378f463ef73364c89feb0fc923f4dc867332a3.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:openCryptoki-3.23.0-2.1.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-40253",
          "url": "https://www.suse.com/security/cve/CVE-2026-40253"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1262283 for CVE-2026-40253",
          "url": "https://bugzilla.suse.com/1262283"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:openCryptoki-3.23.0-2.1.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:openCryptoki-3.23.0-2.1.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-28T10:44:27Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-40253"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…