JLSEC-2026-492

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2026/JLSEC-2026-492.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-492.json
JSON Data
https://api.osv.dev/v1/vulns/JLSEC-2026-492
Upstream
  • CVE-2026-7598
Published
2026-05-08T14:39:40.462Z
Modified
2026-05-08T14:45:06.196595Z
Summary
[none]
Details

A security vulnerability has been detected in libssh2 up to 1.11.1. The impacted element is the function userauthpassword of the file src/userauth.c. Such manipulation of the argument usernamelen/password_len leads to integer overflow. The attack may be launched remotely. The name of the patch is 256d04b60d80bf1190e96b0ad1e91b2174d744b1. A patch should be applied to remediate this issue.

Database specific
{
    "sources": [
        {
            "id": "CVE-2026-7598",
            "database_specific": {
                "status": "Analyzed"
            },
            "imported": "2026-05-07T17:13:44.796Z",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2026-7598",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-7598",
            "modified": "2026-05-07T01:47:08.857Z",
            "published": "2026-05-01T22:16:16.947Z"
        }
    ],
    "license": "CC-BY-4.0"
}
References

Affected packages

Julia / LibSSH2_jll

Package

Name
LibSSH2_jll
Purl
pkg:julia/LibSSH2_jll?uuid=29816b5a-b9ab-546f-933c-edad1886dfa8

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.11.101+0

Database specific

source
"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-492.json"