openSUSE 16 Security Update : osslsigncode (openSUSE-SU-2026:20473-1)

critical Nessus Plugin ID 305838

Synopsis

The remote openSUSE host is missing a security update.

Description

The remote openSUSE 16 host has a package installed that is affected by a vulnerability as referenced in the openSUSE- SU-2026:20473-1 advisory.

Changes in osslsigncode:

- Update to 2.13 (bsc#1260680, CVE-2025-70888):
* fixed integer overflows when processing APPX compressed data streams
* fixed double-free vulnerabilities in APPX file processing
* fixed multiple memory corruption issues in PE page hash computation

- Changes from 2.12:
* fixed a buffer overflow while extracting message digests

- Changes from 2.11:
* added keyUsage validation for signer certificate
* added printing CRL details during signature verification
* implemented a workaround for CRL servers returning the HTTP Content-Type header other than application/pkix-crl
* fixed HTTP keep-alive handling
* fixed macOS compiler and linker flags
* fixed undefined BIO_get_fp() behavior with BIO_FLAGS_UPLINK_INTERNAL

- update to 2.10:
* added JavaScript signing
* added PKCS#11 provider support (requires OpenSSL 3.0+)
* added support for providers without specifying
-pkcs11module option
* (OpenSSL 3.0+, e.g., for the upcoming CNG provider)
* added compatibility with the CNG engine version 1.1 or later
* added the -engineCtrl option to control hardware and CNG engines
* added the '-blobFile' option to specify a file containing the blob content
* improved unauthenticated blob support (thanks to Asger Hautop Drewsen)
* improved UTF-8 handling for certificate subjects and issuers
* fixed support for multiple signerInfo contentType OIDs (CTL and Authenticode)
* fixed tests for python-cryptography >= 43.0.0

- update to version 2.9:
* added a 64 bit long pseudo-random NONCE in the TSA request
* missing NID_pkcs9_signingTime is no longer an error
* added support for PEM-encoded CRLs
* fixed the APPX central directory sorting order
* added a special - file name to read the passphrase from stdin
* used native HTTP client with OpenSSL 3.x, removing libcurl dependency
* added '-login' option to force a login to PKCS11 engines
* added the -ignore-crl option to disable fetching and verifying CRL Distribution Points
* changed error output to stderr instead of stdout
* various testing framework improvements
* various memory corruption fixes

- update to version 2.8:
* Microsoft PowerShell signing sponsored by Cisco Systems, Inc.
* fixed setting unauthenticated attributes (Countersignature, Unauthenticated
* Data Blob) in a nested signature
* added the -index option to verify a specific signature or modify its unauthenticated attributes
* added CAT file verification
* added listing the contents of a CAT file with the -verbose option
* added the new extract-data command to extract a PKCS#7 data content to be signed with sign and attached with attach-signature
* added PKCS9_SEQUENCE_NUMBER authenticated attribute support
* added the -ignore-cdp option to disable CRL Distribution Points (CDP) online verification
* unsuccessful CRL retrieval and verification changed into a critical error the -p option modified to also use to configured proxy to connect CRL Distribution Points
* added implicit allowlisting of the Microsoft Root Authority serial number 00C1008B3C3C8811D13EF663ECDF40
* added listing of certificate chain retrieved from the signature in case of verification failure

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected osslsigncode package.

See Also

https://bugzilla.suse.com/1260680

https://www.suse.com/security/cve/CVE-2025-70888

Plugin Details

Severity: Critical

ID: 305838

File Name: openSUSE-2026-20473-1.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 4/10/2026

Updated: 4/10/2026

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-70888

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:osslsigncode, cpe:/o:novell:opensuse:16.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 4/7/2026

Vulnerability Publication Date: 3/25/2026

Reference Information

CVE: CVE-2025-70888