JLSEC-2025-188

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-188.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-188.json
JSON Data
https://api.test.osv.dev/v1/vulns/JLSEC-2025-188
Upstream
Published
2025-10-27T15:45:54.694Z
Modified
2025-11-03T00:18:37.441616Z
Summary
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer over...
Details

In libssh2 v1.9.0 and earlier versions, the SSHMSGDISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.

Database specific
{
    "sources": [
        {
            "published": "2019-10-21T22:15:10.523Z",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2019-17498",
            "modified": "2024-11-21T04:32:22.850Z",
            "imported": "2025-10-21T17:13:02.869Z",
            "id": "CVE-2019-17498",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17498"
        }
    ],
    "license": "CC-BY-4.0"
}
References

Affected packages

Julia / LibSSH2_jll

Package

Name
LibSSH2_jll
Purl
pkg:julia/LibSSH2_jll?uuid=29816b5a-b9ab-546f-933c-edad1886dfa8

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.10.1+0