{"id":"JLSEC-2026-387","details":"An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.","modified":"2026-05-04T13:15:23.855174Z","published":"2026-05-04T13:12:06.605Z","upstream":["CVE-2022-27775"],"database_specific":{"sources":[{"published":"2022-06-02T14:15:43.510Z","database_specific":{"status":"Modified"},"html_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27775","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-27775","imported":"2026-05-02T08:39:44.749Z","modified":"2024-11-21T06:56:09.800Z","id":"CVE-2022-27775"}],"license":"CC-BY-4.0"},"references":[{"type":"WEB","url":"https://hackerone.com/reports/1546268"},{"type":"WEB","url":"https://hackerone.com/reports/1546268"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202212-01"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202212-01"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220609-0008/"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220609-0008/"},{"type":"WEB","url":"https://www.debian.org/security/2022/dsa-5197"},{"type":"WEB","url":"https://www.debian.org/security/2022/dsa-5197"}],"affected":[{"package":{"name":"CURL_jll","ecosystem":"Julia","purl":"pkg:julia/CURL_jll?uuid=b21e61f3-bafc-59ac-ab14-4c5c62d6588d"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"8.5.0+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-387.json"}},{"package":{"name":"LibCURL_jll","ecosystem":"Julia","purl":"pkg:julia/LibCURL_jll?uuid=deac9b47-8bc7-5906-a0fe-35ac56dc84c0"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"7.83.1+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-387.json"}}],"schema_version":"1.7.5"}