{"id":"CVE-2020-22218","details":"An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.","modified":"2026-04-10T04:18:51.146332Z","published":"2023-08-22T19:16:19.120Z","related":["SUSE-SU-2023:3555-1","SUSE-SU-2023:3738-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00006.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20231006-0002/"},{"type":"FIX","url":"https://github.com/libssh2/libssh2/pull/476"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libssh2/libssh2","events":[{"introduced":"0"},{"last_affected":"635caa90787220ac3773c1d5ba11f1236c22eae8"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.10.0"}]}}],"versions":["RELEASE.0.1","RELEASE.0.10","RELEASE.0.11","RELEASE.0.12","RELEASE.0.13","RELEASE.0.14","RELEASE.0.15","RELEASE.0.16","RELEASE.0.17","RELEASE.0.18","RELEASE.0.3","RELEASE.0.5","RELEASE.0.6","RELEASE.0.7","RELEASE.0.8","RELEASE.1.0","RELEASE.1.1","beforenb-0.14","beforenb2-0.14","libssh2-1.10.0","libssh2-1.2","libssh2-1.2.1","libssh2-1.2.3","libssh2-1.2.4","libssh2-1.2.5","libssh2-1.2.6","libssh2-1.2.7","libssh2-1.2.8","libssh2-1.2.9","libssh2-1.3.0","libssh2-1.4.0","libssh2-1.4.1","libssh2-1.4.2","libssh2-1.4.3","libssh2-1.5.0","libssh2-1.6.0","libssh2-1.7.0","libssh2-1.8.0","libssh2-1.9.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-22218.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}