SUSE SLES15 Security Update : openssl-3 (SUSE-SU-2026:0310-1)

high Nessus Plugin ID 297089

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:0310-1 advisory.

- CVE-2025-15467: Stack buffer overflow in CMS AuthEnvelopedData parsing (bsc#1256830).
- CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes (bsc#1256834).
- CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (bsc#1256835).
- CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (bsc#1256836).
- CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response() function (bsc#1256837).
- CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (bsc#1256838).
- CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing (bsc#1256839).
- CVE-2026-22796: ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (bsc#1256840).

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected libopenssl-3-devel, libopenssl3 and / or openssl-3 packages.

See Also

https://bugzilla.suse.com/1256830

https://bugzilla.suse.com/1256834

https://bugzilla.suse.com/1256835

https://bugzilla.suse.com/1256836

https://bugzilla.suse.com/1256837

https://bugzilla.suse.com/1256838

https://bugzilla.suse.com/1256839

https://bugzilla.suse.com/1256840

https://www.suse.com/security/cve/CVE-2025-15467

https://www.suse.com/security/cve/CVE-2025-68160

https://www.suse.com/security/cve/CVE-2025-69418

https://www.suse.com/security/cve/CVE-2025-69419

https://www.suse.com/security/cve/CVE-2025-69420

https://www.suse.com/security/cve/CVE-2025-69421

https://www.suse.com/security/cve/CVE-2026-22795

https://www.suse.com/security/cve/CVE-2026-22796

http://www.nessus.org/u?ca505770

Plugin Details

Severity: High

ID: 297089

File Name: suse_SU-2026-0310-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 1/29/2026

Updated: 1/29/2026

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-15467

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2025-69420

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:libopenssl-3-devel, p-cpe:/a:novell:suse_linux:libopenssl3, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:openssl-3

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 1/28/2026

Vulnerability Publication Date: 1/27/2026

Reference Information

CVE: CVE-2025-15467, CVE-2025-68160, CVE-2025-69418, CVE-2025-69419, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796

SuSE: SUSE-SU-2026:0310-1