{"id":"ALPINE-CVE-2026-31790","details":"Issue summary: Applications using RSASVE key encapsulation to establish\na secret encryption key can send contents of an uninitialized memory buffer to\na malicious peer.\n\nImpact summary: The uninitialized buffer might contain sensitive data from the\nprevious execution of the application process which leads to sensitive data\nleakage to an attacker.\n\nRSA_public_encrypt() returns the number of bytes written on success and -1\non error. The affected code tests only whether the return value is non-zero.\nAs a result, if RSA encryption fails, encapsulation can still return success to\nthe caller, set the output lengths, and leave the caller to use the contents of\nthe ciphertext buffer as if a valid KEM ciphertext had been produced.\n\nIf applications use EVP_PKEY_encapsulate() with RSA/RSASVE on an\nattacker-supplied invalid RSA public key without first validating that key,\nthen this may cause stale or uninitialized contents of the caller-provided\nciphertext buffer to be disclosed to the attacker in place of the KEM\nciphertext.\n\nAs a workaround calling EVP_PKEY_public_check() or\nEVP_PKEY_public_check_quick() before EVP_PKEY_encapsulate() will mitigate\nthe issue.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.1 and 3.0 are affected by this issue.","modified":"2026-04-10T06:31:26.206813Z","published":"2026-04-07T22:16:21.770Z","upstream":["CVE-2026-31790"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2026-31790"}],"affected":[{"package":{"name":"openssl","ecosystem":"Alpine:v3.20","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.3.7-r0"}]}],"versions":["1.1.1-r0","1.1.1-r1","1.1.1-r2","1.1.1-r3","1.1.1-r4","1.1.1-r5","1.1.1a-r0","1.1.1a-r1","1.1.1b-r0","1.1.1b-r1","1.1.1c-r0","1.1.1c-r1","1.1.1d-r1","1.1.1d-r2","1.1.1d-r3","1.1.1d-r4","1.1.1d-r5","1.1.1e-r0","1.1.1f-r0","1.1.1g-r0","1.1.1h-r0","1.1.1i-r0","1.1.1j-r0","1.1.1k-r0","1.1.1k-r1","1.1.1l-r0","3.0.0-r0","3.0.0-r1","3.0.0-r2","3.0.0-r3","3.0.0-r4","3.0.1-r0","3.0.1-r1","3.0.2-r0","3.0.3-r0","3.0.5-r0","3.0.5-r1","3.0.5-r2","3.0.5-r3","3.0.6-r0","3.0.7-r0","3.0.7-r1","3.0.7-r2","3.0.8-r0","3.0.8-r1","3.1.0-r0","3.1.0-r1","3.1.0-r2","3.1.0-r3","3.1.0-r4","3.1.0-r5","3.1.1-r0","3.1.1-r1","3.1.1-r2","3.1.1-r3","3.1.2-r0","3.1.3-r0","3.1.4-r0","3.1.4-r1","3.1.4-r2","3.1.4-r3","3.1.4-r4","3.1.4-r5","3.1.5-r5","3.2.1-r0","3.2.1-r1","3.2.1-r2","3.3.0-r0","3.3.0-r1","3.3.0-r2","3.3.0-r3","3.3.1-r0","3.3.1-r1","3.3.1-r2","3.3.1-r3","3.3.2-r0","3.3.2-r1","3.3.2-r2","3.3.3-r0","3.3.4-r0","3.3.5-r0","3.3.6-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2026-31790.json"}},{"package":{"name":"openssl","ecosystem":"Alpine:v3.21","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.3.7-r0"}]}],"versions":["1.1.1-r0","1.1.1-r1","1.1.1-r2","1.1.1-r3","1.1.1-r4","1.1.1-r5","1.1.1a-r0","1.1.1a-r1","1.1.1b-r0","1.1.1b-r1","1.1.1c-r0","1.1.1c-r1","1.1.1d-r1","1.1.1d-r2","1.1.1d-r3","1.1.1d-r4","1.1.1d-r5","1.1.1e-r0","1.1.1f-r0","1.1.1g-r0","1.1.1h-r0","1.1.1i-r0","1.1.1j-r0","1.1.1k-r0","1.1.1k-r1","1.1.1l-r0","3.0.0-r0","3.0.0-r1","3.0.0-r2","3.0.0-r3","3.0.0-r4","3.0.1-r0","3.0.1-r1","3.0.2-r0","3.0.3-r0","3.0.5-r0","3.0.5-r1","3.0.5-r2","3.0.5-r3","3.0.6-r0","3.0.7-r0","3.0.7-r1","3.0.7-r2","3.0.8-r0","3.0.8-r1","3.1.0-r0","3.1.0-r1","3.1.0-r2","3.1.0-r3","3.1.0-r4","3.1.0-r5","3.1.1-r0","3.1.1-r1","3.1.1-r2","3.1.1-r3","3.1.2-r0","3.1.3-r0","3.1.4-r0","3.1.4-r1","3.1.4-r2","3.1.4-r3","3.1.4-r4","3.1.4-r5","3.1.5-r5","3.2.1-r0","3.2.1-r1","3.2.1-r2","3.3.0-r0","3.3.0-r1","3.3.0-r2","3.3.0-r3","3.3.1-r0","3.3.1-r1","3.3.1-r2","3.3.1-r3","3.3.2-r0","3.3.2-r1","3.3.2-r2","3.3.2-r3","3.3.2-r4","3.3.2-r5","3.3.2-r6","3.3.3-r0","3.3.4-r0","3.3.5-r0","3.3.6-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2026-31790.json"}},{"package":{"name":"openssl","ecosystem":"Alpine:v3.22","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.5.6-r0"}]}],"versions":["1.1.1-r0","1.1.1-r1","1.1.1-r2","1.1.1-r3","1.1.1-r4","1.1.1-r5","1.1.1a-r0","1.1.1a-r1","1.1.1b-r0","1.1.1b-r1","1.1.1c-r0","1.1.1c-r1","1.1.1d-r1","1.1.1d-r2","1.1.1d-r3","1.1.1d-r4","1.1.1d-r5","1.1.1e-r0","1.1.1f-r0","1.1.1g-r0","1.1.1h-r0","1.1.1i-r0","1.1.1j-r0","1.1.1k-r0","1.1.1k-r1","1.1.1l-r0","3.0.0-r0","3.0.0-r1","3.0.0-r2","3.0.0-r3","3.0.0-r4","3.0.1-r0","3.0.1-r1","3.0.2-r0","3.0.3-r0","3.0.5-r0","3.0.5-r1","3.0.5-r2","3.0.5-r3","3.0.6-r0","3.0.7-r0","3.0.7-r1","3.0.7-r2","3.0.8-r0","3.0.8-r1","3.1.0-r0","3.1.0-r1","3.1.0-r2","3.1.0-r3","3.1.0-r4","3.1.0-r5","3.1.1-r0","3.1.1-r1","3.1.1-r2","3.1.1-r3","3.1.2-r0","3.1.3-r0","3.1.4-r0","3.1.4-r1","3.1.4-r2","3.1.4-r3","3.1.4-r4","3.1.4-r5","3.1.5-r5","3.2.1-r0","3.2.1-r1","3.2.1-r2","3.3.0-r0","3.3.0-r1","3.3.0-r2","3.3.0-r3","3.3.1-r0","3.3.1-r1","3.3.1-r2","3.3.1-r3","3.3.2-r0","3.3.2-r1","3.3.2-r2","3.3.2-r3","3.3.2-r4","3.3.2-r5","3.3.2-r6","3.3.3-r0","3.5.0-r0","3.5.1-r0","3.5.2-r0","3.5.3-r0","3.5.3-r1","3.5.4-r0","3.5.5-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2026-31790.json"}},{"package":{"name":"openssl","ecosystem":"Alpine:v3.23","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.5.6-r0"}]}],"versions":["1.1.1-r0","1.1.1-r1","1.1.1-r2","1.1.1-r3","1.1.1-r4","1.1.1-r5","1.1.1a-r0","1.1.1a-r1","1.1.1b-r0","1.1.1b-r1","1.1.1c-r0","1.1.1c-r1","1.1.1d-r1","1.1.1d-r2","1.1.1d-r3","1.1.1d-r4","1.1.1d-r5","1.1.1e-r0","1.1.1f-r0","1.1.1g-r0","1.1.1h-r0","1.1.1i-r0","1.1.1j-r0","1.1.1k-r0","1.1.1k-r1","1.1.1l-r0","3.0.0-r0","3.0.0-r1","3.0.0-r2","3.0.0-r3","3.0.0-r4","3.0.1-r0","3.0.1-r1","3.0.2-r0","3.0.3-r0","3.0.5-r0","3.0.5-r1","3.0.5-r2","3.0.5-r3","3.0.6-r0","3.0.7-r0","3.0.7-r1","3.0.7-r2","3.0.8-r0","3.0.8-r1","3.1.0-r0","3.1.0-r1","3.1.0-r2","3.1.0-r3","3.1.0-r4","3.1.0-r5","3.1.1-r0","3.1.1-r1","3.1.1-r2","3.1.1-r3","3.1.2-r0","3.1.3-r0","3.1.4-r0","3.1.4-r1","3.1.4-r2","3.1.4-r3","3.1.4-r4","3.1.4-r5","3.1.5-r5","3.2.1-r0","3.2.1-r1","3.2.1-r2","3.3.0-r0","3.3.0-r1","3.3.0-r2","3.3.0-r3","3.3.1-r0","3.3.1-r1","3.3.1-r2","3.3.1-r3","3.3.2-r0","3.3.2-r1","3.3.2-r2","3.3.2-r3","3.3.2-r4","3.3.2-r5","3.3.2-r6","3.3.3-r0","3.5.0-r0","3.5.1-r0","3.5.2-r0","3.5.3-r0","3.5.3-r1","3.5.3-r2","3.5.4-r0","3.5.5-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2026-31790.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}