{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "1.1.1w-r3:\n  - CVE-2026-28387\n  - CVE-2026-28388\n  - CVE-2026-28389\n  - CVE-2026-28390",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1778255254",
        "url": "https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1778255254"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_alt_common/alpinelinux3.23/advisories/2026/clsa-2026_1778255254.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-05-08T15:50:33Z",
      "generator": {
        "date": "2026-05-08T15:50:33Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1778255254",
      "initial_release_date": "2026-05-08T15:50:33Z",
      "revision_history": [
        {
          "date": "2026-05-08T15:50:33Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "alt-openssl11: Fix of 4 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Alpine Linux 3.23",
                "product": {
                  "name": "Alpine Linux 3.23",
                  "product_id": "Alpine-Linux-3.23",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:alpinelinux:alpine_linux:3.23:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Alpine Linux"
          }
        ],
        "category": "vendor",
        "name": "Alpine Linux"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "alt-openssl11-dev-1.1.1w-rr3.aarch64",
                "product": {
                  "name": "alt-openssl11-dev-1.1.1w-rr3.aarch64",
                  "product_id": "alt-openssl11-dev-1.1.1w-rr3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:apk/tuxcare/alt-openssl11-dev@1.1.1w-rr3?arch=aarch64&os_name=alpine&os_version=3.23"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-openssl11-1.1.1w-rr3.aarch64",
                "product": {
                  "name": "alt-openssl11-1.1.1w-rr3.aarch64",
                  "product_id": "alt-openssl11-1.1.1w-rr3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:apk/tuxcare/alt-openssl11@1.1.1w-rr3?arch=aarch64&os_name=alpine&os_version=3.23"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-openssl11-libs-1.1.1w-rr3.aarch64",
                "product": {
                  "name": "alt-openssl11-libs-1.1.1w-rr3.aarch64",
                  "product_id": "alt-openssl11-libs-1.1.1w-rr3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:apk/tuxcare/alt-openssl11-libs@1.1.1w-rr3?arch=aarch64&os_name=alpine&os_version=3.23"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "alt-openssl11-dev-1.1.1w-rr3.x86_64",
                "product": {
                  "name": "alt-openssl11-dev-1.1.1w-rr3.x86_64",
                  "product_id": "alt-openssl11-dev-1.1.1w-rr3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:apk/tuxcare/alt-openssl11-dev@1.1.1w-rr3?arch=x86_64&os_name=alpine&os_version=3.23"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-openssl11-1.1.1w-rr3.x86_64",
                "product": {
                  "name": "alt-openssl11-1.1.1w-rr3.x86_64",
                  "product_id": "alt-openssl11-1.1.1w-rr3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:apk/tuxcare/alt-openssl11@1.1.1w-rr3?arch=x86_64&os_name=alpine&os_version=3.23"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-openssl11-libs-1.1.1w-rr3.x86_64",
                "product": {
                  "name": "alt-openssl11-libs-1.1.1w-rr3.x86_64",
                  "product_id": "alt-openssl11-libs-1.1.1w-rr3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:apk/tuxcare/alt-openssl11-libs@1.1.1w-rr3?arch=x86_64&os_name=alpine&os_version=3.23"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-openssl11-dev-1.1.1w-rr3.aarch64 as a component of Alpine Linux 3.23",
          "product_id": "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64"
        },
        "product_reference": "alt-openssl11-dev-1.1.1w-rr3.aarch64",
        "relates_to_product_reference": "Alpine-Linux-3.23"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-openssl11-dev-1.1.1w-rr3.x86_64 as a component of Alpine Linux 3.23",
          "product_id": "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64"
        },
        "product_reference": "alt-openssl11-dev-1.1.1w-rr3.x86_64",
        "relates_to_product_reference": "Alpine-Linux-3.23"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-openssl11-1.1.1w-rr3.x86_64 as a component of Alpine Linux 3.23",
          "product_id": "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64"
        },
        "product_reference": "alt-openssl11-1.1.1w-rr3.x86_64",
        "relates_to_product_reference": "Alpine-Linux-3.23"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-openssl11-1.1.1w-rr3.aarch64 as a component of Alpine Linux 3.23",
          "product_id": "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64"
        },
        "product_reference": "alt-openssl11-1.1.1w-rr3.aarch64",
        "relates_to_product_reference": "Alpine-Linux-3.23"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-openssl11-libs-1.1.1w-rr3.aarch64 as a component of Alpine Linux 3.23",
          "product_id": "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64"
        },
        "product_reference": "alt-openssl11-libs-1.1.1w-rr3.aarch64",
        "relates_to_product_reference": "Alpine-Linux-3.23"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-openssl11-libs-1.1.1w-rr3.x86_64 as a component of Alpine Linux 3.23",
          "product_id": "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
        },
        "product_reference": "alt-openssl11-libs-1.1.1w-rr3.x86_64",
        "relates_to_product_reference": "Alpine-Linux-3.23"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-28389",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "Issue summary: During processing of a crafted CMS EnvelopedData message\nwith KeyAgreeRecipientInfo a NULL pointer dereference can happen.\n\nImpact summary: Applications that process attacker-controlled CMS data may\ncrash before authentication or cryptographic operations occur resulting in\nDenial of Service.\n\nWhen a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is\nprocessed, the optional parameters field of KeyEncryptionAlgorithmIdentifier\nis examined without checking for its presence. This results in a NULL\npointer dereference if the field is missing.\n\nApplications and services that call CMS_decrypt() on untrusted input\n(e.g., S/MIME processing or CMS-based protocols) are vulnerable.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\nissue, as the affected code is outside the OpenSSL FIPS module boundary.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
          "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
          "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-common/cve/CVE-2026-28389"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/16cea4188e0ea567deb4f93f85902247e67384f5",
          "url": "https://github.com/openssl/openssl/commit/16cea4188e0ea567deb4f93f85902247e67384f5"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/785cbf7ea3b5a6f5adf0c1ccb92b79d89c35c616",
          "url": "https://github.com/openssl/openssl/commit/785cbf7ea3b5a6f5adf0c1ccb92b79d89c35c616"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/7b5274e812400cacb6f3be4c2df5340923fa807f",
          "url": "https://github.com/openssl/openssl/commit/7b5274e812400cacb6f3be4c2df5340923fa807f"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/c6725634e089eb2b634b10ede33944be7248172a",
          "url": "https://github.com/openssl/openssl/commit/c6725634e089eb2b634b10ede33944be7248172a"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/f80f83bc5fd036bc47d773e8b15a001e2b4ce686",
          "url": "https://github.com/openssl/openssl/commit/f80f83bc5fd036bc47d773e8b15a001e2b4ce686"
        },
        {
          "category": "external",
          "summary": "https://openssl-library.org/news/secadv/20260407.txt",
          "url": "https://openssl-library.org/news/secadv/20260407.txt"
        }
      ],
      "release_date": "2026-04-07T22:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-08T15:47:41.602302Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1778255254",
          "product_ids": [
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1778255254"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-0727",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL\nto crash leading to a potential Denial of Service attack\n\nImpact summary: Applications loading files in the PKCS12 format from untrusted\nsources might terminate abruptly.\n\nA file in PKCS12 format can contain certificates and keys and may come from an\nuntrusted source. The PKCS12 specification allows certain fields to be NULL, but\nOpenSSL does not correctly check for this case. This can lead to a NULL pointer\ndereference that results in OpenSSL crashing. If an application processes PKCS12\nfiles from an untrusted source using the OpenSSL APIs then that application will\nbe vulnerable to this issue.\n\nOpenSSL APIs that are vulnerable to this are: PKCS12_parse(),\nPKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()\nand PKCS12_newpass().\n\nWe have also fixed a similar issue in SMIME_write_PKCS7(). However since this\nfunction is related to writing data we do not consider it security significant.\n\nThe FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
          "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
          "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-common/cve/CVE-2024-0727"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/09df4395b5071217b76dc7d3d2e630eb8c5a79c2",
          "url": "https://github.com/openssl/openssl/commit/09df4395b5071217b76dc7d3d2e630eb8c5a79c2"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/775acfdbd0c6af9ac855f34969cdab0c0c90844a",
          "url": "https://github.com/openssl/openssl/commit/775acfdbd0c6af9ac855f34969cdab0c0c90844a"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/d135eeab8a5dbf72b3da5240bab9ddb7678dbd2c",
          "url": "https://github.com/openssl/openssl/commit/d135eeab8a5dbf72b3da5240bab9ddb7678dbd2c"
        },
        {
          "category": "external",
          "summary": "https://github.openssl.org/openssl/extended-releases/commit/03b3941d60c4bce58fab69a0c22377ab439bc0e8",
          "url": "https://github.openssl.org/openssl/extended-releases/commit/03b3941d60c4bce58fab69a0c22377ab439bc0e8"
        },
        {
          "category": "external",
          "summary": "https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539",
          "url": "https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539"
        },
        {
          "category": "external",
          "summary": "https://www.openssl.org/news/secadv/20240125.txt",
          "url": "https://www.openssl.org/news/secadv/20240125.txt"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2024/03/11/1",
          "url": "http://www.openwall.com/lists/oss-security/2024/03/11/1"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/10/msg00033.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00033.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/11/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20240208-0006/",
          "url": "https://security.netapp.com/advisory/ntap-20240208-0006/"
        }
      ],
      "release_date": "2024-01-26T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-08T15:47:41.602302Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1778255254",
          "product_ids": [
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1778255254"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2026-28390",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "Issue summary: During processing of a crafted CMS EnvelopedData message\nwith KeyTransportRecipientInfo a NULL pointer dereference can happen.\n\nImpact summary: Applications that process attacker-controlled CMS data may\ncrash before authentication or cryptographic operations occur resulting in\nDenial of Service.\n\nWhen a CMS EnvelopedData message that uses KeyTransportRecipientInfo with\nRSA-OAEP encryption is processed, the optional parameters field of\nRSA-OAEP SourceFunc algorithm identifier is examined without checking\nfor its presence. This results in a NULL pointer dereference if the field\nis missing.\n\nApplications and services that call CMS_decrypt() on untrusted input\n(e.g., S/MIME processing or CMS-based protocols) are vulnerable.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\nissue, as the affected code is outside the OpenSSL FIPS module boundary.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
          "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
          "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-common/cve/CVE-2026-28390"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/01194a8f1941115cd0383bfa91c736dd3993c8bc",
          "url": "https://github.com/openssl/openssl/commit/01194a8f1941115cd0383bfa91c736dd3993c8bc"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/2e39b7a6993be445fddb9fbce316fa756e0397b6",
          "url": "https://github.com/openssl/openssl/commit/2e39b7a6993be445fddb9fbce316fa756e0397b6"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/af2a5fecd3e71a29e7568f9c1453dec5cebbaff4",
          "url": "https://github.com/openssl/openssl/commit/af2a5fecd3e71a29e7568f9c1453dec5cebbaff4"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/ea7b4ea4f9f853521ba34830cbcadc970d2e0788",
          "url": "https://github.com/openssl/openssl/commit/ea7b4ea4f9f853521ba34830cbcadc970d2e0788"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/fd2f1a6cf53b9ceeca723a001aa4b825d7c7ee75",
          "url": "https://github.com/openssl/openssl/commit/fd2f1a6cf53b9ceeca723a001aa4b825d7c7ee75"
        },
        {
          "category": "external",
          "summary": "https://openssl-library.org/news/secadv/20260407.txt",
          "url": "https://openssl-library.org/news/secadv/20260407.txt"
        }
      ],
      "release_date": "2026-04-07T22:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-08T15:47:41.602302Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1778255254",
          "product_ids": [
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1778255254"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-28388",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "Issue summary: When a delta CRL that contains a Delta CRL Indicator extension\nis processed a NULL pointer dereference might happen if the required CRL\nNumber extension is missing.\n\nImpact summary: A NULL pointer dereference can trigger a crash which\nleads to a Denial of Service for an application.\n\nWhen CRL processing and delta CRL processing is enabled during X.509\ncertificate verification, the delta CRL processing does not check\nwhether the CRL Number extension is NULL before dereferencing it.\nWhen a malformed delta CRL file is being processed, this parameter\ncan be NULL, causing a NULL pointer dereference.\n\nExploiting this issue requires the X509_V_FLAG_USE_DELTAS flag to be enabled in\nthe verification context, the certificate being verified to contain a\nfreshestCRL extension or the base CRL to have the EXFLAG_FRESHEST flag set, and\nan attacker to provide a malformed CRL to an application that processes it.\n\nThe vulnerability is limited to Denial of Service and cannot be escalated to\nachieve code execution or memory disclosure. For that reason the issue was\nassessed as Low severity according to our Security Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the affected code is outside the OpenSSL FIPS module boundary.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
          "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
          "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-common/cve/CVE-2026-28388"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/59c3b3158553ab53275bbbccca5cb305d591cf2e",
          "url": "https://github.com/openssl/openssl/commit/59c3b3158553ab53275bbbccca5cb305d591cf2e"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/5a0b4930779cd2408880979db765db919da55139",
          "url": "https://github.com/openssl/openssl/commit/5a0b4930779cd2408880979db765db919da55139"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/602542f2c0c2d5edb47128f93eac10b62aeeefb3",
          "url": "https://github.com/openssl/openssl/commit/602542f2c0c2d5edb47128f93eac10b62aeeefb3"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/a9d187dd1000130100fa7ab915f8513532cb3bb8",
          "url": "https://github.com/openssl/openssl/commit/a9d187dd1000130100fa7ab915f8513532cb3bb8"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/d3a901e8d9f021f3e67d6cfbc12e768129862726",
          "url": "https://github.com/openssl/openssl/commit/d3a901e8d9f021f3e67d6cfbc12e768129862726"
        },
        {
          "category": "external",
          "summary": "https://openssl-library.org/news/secadv/20260407.txt",
          "url": "https://openssl-library.org/news/secadv/20260407.txt"
        }
      ],
      "release_date": "2026-04-07T22:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-08T15:47:41.602302Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1778255254",
          "product_ids": [
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1778255254"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-69421",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer\ndereference in the PKCS12_item_decrypt_d2i_ex() function.\n\nImpact summary: A NULL pointer dereference can trigger a crash which leads to\nDenial of Service for an application processing PKCS#12 files.\n\nThe PKCS12_item_decrypt_d2i_ex() function does not check whether the oct\nparameter is NULL before dereferencing it. When called from\nPKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can\nbe NULL, causing a crash. The vulnerability is limited to Denial of Service\nand cannot be escalated to achieve code execution or memory disclosure.\n\nExploiting this issue requires an attacker to provide a malformed PKCS#12 file\nto an application that processes it. For that reason the issue was assessed as\nLow severity according to our Security Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
          "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
          "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-common/cve/CVE-2025-69421"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b",
          "url": "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7",
          "url": "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd",
          "url": "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3",
          "url": "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c",
          "url": "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c"
        },
        {
          "category": "external",
          "summary": "https://openssl-library.org/news/secadv/20260127.txt",
          "url": "https://openssl-library.org/news/secadv/20260127.txt"
        }
      ],
      "release_date": "2026-01-27T16:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-08T15:47:41.602302Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1778255254",
          "product_ids": [
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1778255254"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-28387",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "Issue summary: An uncommon configuration of clients performing DANE TLSA-based\nserver authentication, when paired with uncommon server DANE TLSA records, may\nresult in a use-after-free and/or double-free on the client side.\n\nImpact summary: A use after free can have a range of potential consequences\nsuch as the corruption of valid data, crashes or execution of arbitrary code.\n\nHowever, the issue only affects clients that make use of TLSA records with both\nthe PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate\nusage.\n\nBy far the most common deployment of DANE is in SMTP MTAs for which RFC7672\nrecommends that clients treat as 'unusable' any TLSA records that have the PKIX\ncertificate usages.  These SMTP (or other similar) clients are not vulnerable\nto this issue.  Conversely, any clients that support only the PKIX usages, and\nignore the DANE-TA(2) usage are also not vulnerable.\n\nThe client would also need to be communicating with a server that publishes a\nTLSA RRset with both types of TLSA records.\n\nNo FIPS modules are affected by this issue, the problem code is outside the\nFIPS module boundary.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
          "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
          "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-common/cve/CVE-2026-28387"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/07e727d304746edb49a98ee8f6ab00256e1f012b",
          "url": "https://github.com/openssl/openssl/commit/07e727d304746edb49a98ee8f6ab00256e1f012b"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/258a8f63b26995ba357f4326da00e19e29c6acbe",
          "url": "https://github.com/openssl/openssl/commit/258a8f63b26995ba357f4326da00e19e29c6acbe"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/444958deaf450aea819171f97ae69eaedede42c3",
          "url": "https://github.com/openssl/openssl/commit/444958deaf450aea819171f97ae69eaedede42c3"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/7a4e08cee62a728d32e60b0de89e6764339df0a7",
          "url": "https://github.com/openssl/openssl/commit/7a4e08cee62a728d32e60b0de89e6764339df0a7"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/ec03fa050b3346997ed9c5fef3d0e16ad7db8177",
          "url": "https://github.com/openssl/openssl/commit/ec03fa050b3346997ed9c5fef3d0e16ad7db8177"
        },
        {
          "category": "external",
          "summary": "https://openssl-library.org/news/secadv/20260407.txt",
          "url": "https://openssl-library.org/news/secadv/20260407.txt"
        }
      ],
      "release_date": "2026-04-07T22:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-08T15:47:41.602302Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1778255254",
          "product_ids": [
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1778255254"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-5678",
      "cwe": {
        "id": "CWE-606",
        "name": "Unchecked Input for Loop Condition"
      },
      "notes": [
        {
          "category": "description",
          "text": "Issue summary: Generating excessively long X9.42 DH keys or checking\nexcessively long X9.42 DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_generate_key() to\ngenerate an X9.42 DH key may experience long delays.  Likewise, applications\nthat use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()\nto check an X9.42 DH key or X9.42 DH parameters may experience long delays.\nWhere the key or parameters that are being checked have been obtained from\nan untrusted source this may lead to a Denial of Service.\n\nWhile DH_check() performs all the necessary checks (as of CVE-2023-3817),\nDH_check_pub_key() doesn't make any of these checks, and is therefore\nvulnerable for excessively large P and Q parameters.\n\nLikewise, while DH_generate_key() performs a check for an excessively large\nP, it doesn't check for an excessively large Q.\n\nAn application that calls DH_generate_key() or DH_check_pub_key() and\nsupplies a key or parameters obtained from an untrusted source could be\nvulnerable to a Denial of Service attack.\n\nDH_generate_key() and DH_check_pub_key() are also called by a number of\nother OpenSSL functions.  An application calling any of those other\nfunctions may similarly be affected.  The other functions affected by this\nare DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().\n\nAlso vulnerable are the OpenSSL pkey command line application when using the\n\"-pubcheck\" option, as well as the OpenSSL genpkey command line application.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
          "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
          "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
          "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-common/cve/CVE-2023-5678"
        },
        {
          "category": "external",
          "summary": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055",
          "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055"
        },
        {
          "category": "external",
          "summary": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c",
          "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c"
        },
        {
          "category": "external",
          "summary": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017",
          "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017"
        },
        {
          "category": "external",
          "summary": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6",
          "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6"
        },
        {
          "category": "external",
          "summary": "https://www.openssl.org/news/secadv/20231106.txt",
          "url": "https://www.openssl.org/news/secadv/20231106.txt"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2024/03/11/1",
          "url": "http://www.openwall.com/lists/oss-security/2024/03/11/1"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/10/msg00033.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00033.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/11/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20231130-0010/",
          "url": "https://security.netapp.com/advisory/ntap-20231130-0010/"
        }
      ],
      "release_date": "2023-11-06T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-08T15:47:41.602302Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1778255254",
          "product_ids": [
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els-alt-common/releases/CLSA-2026:1778255254"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-dev-1.1.1w-rr3.x86_64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.aarch64",
            "Alpine-Linux-3.23:alt-openssl11-libs-1.1.1w-rr3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    }
  ]
}