{"id":"JLSEC-2026-155","details":"In libass 0.14.0, the `ass_outline_construct`'s call to `outline_stroke` causes a signed integer overflow.","modified":"2026-04-20T18:15:05.929194Z","published":"2026-04-20T18:02:38.348Z","upstream":["CVE-2020-26682"],"database_specific":{"license":"CC-BY-4.0","sources":[{"modified":"2024-11-21T05:20:14.900Z","published":"2020-10-16T14:15:11.893Z","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26682","id":"CVE-2020-26682","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2020-26682","imported":"2026-04-20T16:56:40.039Z","database_specific":{"status":"Modified"}}]},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2020/11/19/7"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2020/11/19/7"},{"type":"WEB","url":"https://github.com/libass/libass/issues/431"},{"type":"WEB","url":"https://github.com/libass/libass/issues/431"},{"type":"WEB","url":"https://github.com/libass/libass/pull/432"},{"type":"WEB","url":"https://github.com/libass/libass/pull/432"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202012-12"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202012-12"}],"affected":[{"package":{"name":"libass_jll","ecosystem":"Julia","purl":"pkg:julia/libass_jll?uuid=0ac62f75-1d6f-5e53-bd7c-93b484bb37c0"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.15.1+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-155.json"}}],"schema_version":"1.7.5"}