{"id":"JLSEC-2025-189","summary":"An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access...","details":"An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.","modified":"2025-11-06T23:02:40.859121Z","published":"2025-10-27T15:45:54.694Z","upstream":["CVE-2020-22218"],"database_specific":{"sources":[{"url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2020-22218","id":"CVE-2020-22218","modified":"2024-11-21T05:13:11.797Z","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-22218","published":"2023-08-22T19:16:19.120Z","imported":"2025-10-21T17:13:02.870Z"}],"license":"CC-BY-4.0"},"references":[{"type":"WEB","url":"https://github.com/libssh2/libssh2/pull/476"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00006.html"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20231006-0002/"}],"affected":[{"package":{"name":"LibSSH2_jll","ecosystem":"Julia","purl":"pkg:julia/LibSSH2_jll?uuid=29816b5a-b9ab-546f-933c-edad1886dfa8"},"ranges":[{"type":"SEMVER","events":[{"introduced":"1.10.1+0"},{"fixed":"1.11.0+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-189.json"}}],"schema_version":"1.7.3"}