JLSEC-2026-218

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2026/JLSEC-2026-218.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-218.json
JSON Data
https://api.test.osv.dev/v1/vulns/JLSEC-2026-218
Upstream
  • EUVD-2019-10120
  • GHSA-rv3r-f48w-6vvh
Published
2026-04-27T18:33:55.942Z
Modified
2026-04-27T20:32:29.647308771Z
Summary
In situations where an attacker receives automated notification of the success or failure of a...
Details

In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMSdecrypt or PKCS7decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).

Database specific
{
    "license": "CC-BY-4.0",
    "sources": [
        {
            "database_specific": {
                "status": "Modified"
            },
            "imported": "2026-04-27T16:32:26.455Z",
            "id": "CVE-2019-1563",
            "published": "2019-09-10T17:15:11.890Z",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2019-1563",
            "modified": "2024-11-21T04:36:49.310Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1563"
        },
        {
            "id": "GHSA-rv3r-f48w-6vvh",
            "imported": "2026-04-27T16:34:15.394Z",
            "published": "2022-05-24T16:55:53Z",
            "url": "https://api.github.com/advisories/GHSA-rv3r-f48w-6vvh",
            "modified": "2024-04-04T01:55:07Z",
            "html_url": "https://github.com/advisories/GHSA-rv3r-f48w-6vvh"
        },
        {
            "id": "EUVD-2019-10120",
            "imported": "2026-04-27T16:33:20.939Z",
            "published": "2019-09-10T16:58:35Z",
            "url": "https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2019-10120",
            "modified": "2024-09-17T01:11:46Z",
            "html_url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2019-10120"
        }
    ]
}
References

Affected packages

Julia / OpenSSL_jll

Package

Name
OpenSSL_jll
Purl
pkg:julia/OpenSSL_jll?uuid=458c3c95-2e84-50aa-8efc-19380b2a3a95

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.1+2

Database specific

source
"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-218.json"