Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:apk/alpine/openssl@0?arch=s390x&distroversion=v3.19&reponame=main
purl pkg:apk/alpine/openssl@0?arch=s390x&distroversion=v3.19&reponame=main
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (6)
Vulnerability Summary Aliases
VCID-95ub-7a6n-afdg openssl: the c_rehash script allows command injection CVE-2022-2068
VCID-99xj-17z4-1qhe openssl-src heap memory corruption with RSA private key operation The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue. CVE-2022-2274
GHSA-735f-pg76-fxc4
VCID-9nmg-h851-gfcq openssl: Timing side-channel in SM2 algorithm on 64 bit ARM CVE-2025-9231
VCID-hjgb-ch1w-nbfs Improper Certificate Validation The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications. CVE-2023-0466
VCID-q2ae-5r8q-3fbv Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') The `c_rehash` script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the `c_rehash` script is considered obsolete and should be replaced by the OpenSSL `rehash` command line tool. CVE-2022-1292
VCID-t4t8-753w-zqc5 POLY1305 MAC implementation corrupts XMM registers on Windows Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Before returning to the caller all the XMM registers are set to zero rather than restoring their previous content. The vulnerable code is used only on newer x86_64 processors supporting the AVX512-IFMA instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However given the contents of the registers are just zeroized so the attacker cannot put arbitrary values inside, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3 and a malicious client can influence whether this AEAD cipher is used by the server. This implies that server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue. As a workaround the AVX512-IFMA instructions support can be disabled at runtime by setting the environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000 The FIPS provider is not affected by this issue. CVE-2023-4807

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-06T04:52:25.468175+00:00 Alpine Linux Importer Fixing VCID-9nmg-h851-gfcq https://secdb.alpinelinux.org/v3.19/main.json 38.1.0
2026-04-06T04:52:16.582124+00:00 Alpine Linux Importer Fixing VCID-99xj-17z4-1qhe https://secdb.alpinelinux.org/v3.19/main.json 38.1.0
2026-04-03T17:51:23.191287+00:00 Alpine Linux Importer Fixing VCID-hjgb-ch1w-nbfs https://secdb.alpinelinux.org/v3.19/main.json 38.1.0
2026-04-01T19:29:07.925278+00:00 Alpine Linux Importer Fixing VCID-95ub-7a6n-afdg https://secdb.alpinelinux.org/v3.19/main.json 38.0.0
2026-04-01T19:11:52.030616+00:00 Alpine Linux Importer Fixing VCID-q2ae-5r8q-3fbv https://secdb.alpinelinux.org/v3.19/main.json 38.0.0
2026-04-01T19:07:46.641356+00:00 Alpine Linux Importer Fixing VCID-t4t8-753w-zqc5 https://secdb.alpinelinux.org/v3.19/main.json 38.0.0