SUSE-SU-2026:21107-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-202621107-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:21107-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2026:21107-1
Upstream
  • CVE-2026-28387
  • CVE-2026-28388
  • CVE-2026-28389
  • CVE-2026-28390
Related
Published
2026-04-13T15:48:01Z
Modified
2026-04-17T18:23:52.456743Z
Summary
Security update for openssl-3
Details

This update for openssl-3 fixes the following issues:

Security issues fixed:

  • CVE-2026-2673: TLS 1.3 servers may choose unexpected key agreement group (bsc#1259652).
  • CVE-2026-28387: potential use-after-free in DANE client code (bsc#1260441).
  • CVE-2026-28388: NULL pointer dereference when processing a delta (bsc#1260442).
  • CVE-2026-28389: possible NULL pointer dereference when processing CMS KeyAgreeRecipientInfo (bsc#1260443).
  • CVE-2026-28390: NULL pointer dereference during processing of a crafted CMS EnvelopedData message with KeyTransportRecipientInfo (bsc#1261678).
  • CVE-2026-31789: heap buffer overflow in hexadecimal conversion (bsc#1260444).
  • CVE-2026-31790: incorrect failure handling in RSA KEM RSASVE encapsulation (bsc#1260445).

Other updates and bugfixes:

  • Enable MD2 in legacy provider (jsc#PED-15724).
References

Affected packages

SUSE:Linux Micro 6.2 / openssl-3

Package

Name
openssl-3
Purl
pkg:rpm/suse/openssl-3&distro=SUSE%20Linux%20Micro%206.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.0-160000.7.1

Ecosystem specific

{
    "binaries": [
        {
            "libopenssl-3-devel": "3.5.0-160000.7.1",
            "openssl-3": "3.5.0-160000.7.1",
            "libopenssl-3-fips-provider": "3.5.0-160000.7.1",
            "libopenssl3": "3.5.0-160000.7.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:21107-1.json"