CVE-2026-31789 Affecting libopenssl1_1-32bit package, versions <1.1.1l-150400.7.90.1


Severity

Recommended
0.0
high
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES154-LIBOPENSSL1132BIT-16019006
  • published13 Apr 2026
  • disclosed10 Apr 2026

Introduced: 10 Apr 2026

NewCVE-2026-31789  (opens in a new tab)

How to fix?

Upgrade SLES:15.4 libopenssl1_1-32bit to version 1.1.1l-150400.7.90.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libopenssl1_1-32bit package and not the libopenssl1_1-32bit package as distributed by SLES. See How to fix? for SLES:15.4 relevant fixed versions and status.

Issue summary: Converting an excessively large OCTET STRING value to a hexadecimal string leads to a heap buffer overflow on 32 bit platforms.

Impact summary: A heap buffer overflow may lead to a crash or possibly an attacker controlled code execution or other undefined behavior.

If an attacker can supply a crafted X.509 certificate with an excessively large OCTET STRING value in extensions such as the Subject Key Identifier (SKID) or Authority Key Identifier (AKID) which are being converted to hex, the size of the buffer needed for the result is calculated as multiplication of the input length by 3. On 32 bit platforms, this multiplication may overflow resulting in the allocation of a smaller buffer and a heap buffer overflow.

Applications and services that print or log contents of untrusted X.509 certificates are vulnerable to this issue. As the certificates would have to have sizes of over 1 Gigabyte, printing or logging such certificates is a fairly unlikely operation and only 32 bit platforms are affected, this issue was assigned Low severity.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.

CVSS Base Scores

version 3.1