JLSEC-2026-57

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2026/JLSEC-2026-57.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-57.json
JSON Data
https://api.osv.dev/v1/vulns/JLSEC-2026-57
Upstream
Published
2026-04-06T13:14:28.546Z
Modified
2026-04-06T13:30:34.324864Z
Summary
[none]
Details

Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser.

Database specific
{
    "license": "CC-BY-4.0",
    "sources": [
        {
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-47629",
            "id": "CVE-2022-47629",
            "imported": "2026-04-06T07:58:29.552Z",
            "published": "2022-12-20T23:15:12.093Z",
            "modified": "2025-04-16T18:16:02.863Z",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-47629"
        }
    ]
}
References

Affected packages

Julia / Libksba_jll

Package

Name
Libksba_jll
Purl
pkg:julia/Libksba_jll?uuid=52a58d30-3731-5a3f-8361-26ffb4f63669

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.7+0

Database specific

source
"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-57.json"