openSUSE 16 Security Update : openssl-3 (openSUSE-SU-2026:20152-1)

high Nessus Plugin ID 297791

Language:

Synopsis

The remote openSUSE host is missing one or more security updates.

Description

The remote openSUSE 16 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2026:20152-1 advisory.

Security fixes:

- CVE-2025-11187: Improper validation of PBMAC1 parameters in PKCS#12 MAC verification (bsc#1256829).
- CVE-2025-15467: Stack buffer overflow in CMS AuthEnvelopedData parsing (bsc#1256830).
- CVE-2025-15468: NULL dereference in SSL_CIPHER_find() function on unknown cipher ID (bsc#1256831).
- CVE-2025-15469: openssl dgst one-shot codepath silently truncates inputs >16MB (bsc#1256832).
- CVE-2025-66199: TLS 1.3 CompressedCertificate excessive memory allocation (bsc#1256833).
- CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes (bsc#1256834).
- CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (bsc#1256835).
- CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (bsc#1256836).
- CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response() function (bsc#1256837).
- CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (bsc#1256838).
- CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing (bsc#1256839).
- CVE-2026-22796: ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (bsc#1256840).

Other fixes:

- Enable livepatching support for ppc64le (bsc#1257274).

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1256829

https://bugzilla.suse.com/1256830

https://bugzilla.suse.com/1256831

https://bugzilla.suse.com/1256832

https://bugzilla.suse.com/1256833

https://bugzilla.suse.com/1256834

https://bugzilla.suse.com/1256835

https://bugzilla.suse.com/1256836

https://bugzilla.suse.com/1256837

https://bugzilla.suse.com/1256838

https://bugzilla.suse.com/1256839

https://bugzilla.suse.com/1256840

https://bugzilla.suse.com/1257274

https://www.suse.com/security/cve/CVE-2025-11187

https://www.suse.com/security/cve/CVE-2025-15467

https://www.suse.com/security/cve/CVE-2025-15468

https://www.suse.com/security/cve/CVE-2025-15469

https://www.suse.com/security/cve/CVE-2025-66199

https://www.suse.com/security/cve/CVE-2025-68160

https://www.suse.com/security/cve/CVE-2025-69418

https://www.suse.com/security/cve/CVE-2025-69419

https://www.suse.com/security/cve/CVE-2025-69420

https://www.suse.com/security/cve/CVE-2025-69421

https://www.suse.com/security/cve/CVE-2026-22795

https://www.suse.com/security/cve/CVE-2026-22796

Plugin Details

Severity: High

ID: 297791

File Name: openSUSE-2026-20152-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 2/4/2026

Updated: 2/4/2026

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2025-69421

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libopenssl3-x86-64-v3, cpe:/o:novell:opensuse:16.0, p-cpe:/a:novell:opensuse:libopenssl-3-devel, p-cpe:/a:novell:opensuse:openssl-3, p-cpe:/a:novell:opensuse:libopenssl-3-fips-provider-x86-64-v3, p-cpe:/a:novell:opensuse:libopenssl-3-fips-provider, p-cpe:/a:novell:opensuse:libopenssl3

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/2/2026

Vulnerability Publication Date: 1/27/2026

Reference Information

CVE: CVE-2025-11187, CVE-2025-15467, CVE-2025-15468, CVE-2025-15469, CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69419, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796