JLSEC-2026-66

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2026/JLSEC-2026-66.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-66.json
JSON Data
https://api.osv.dev/v1/vulns/JLSEC-2026-66
Upstream
Published
2026-04-09T21:32:46.691Z
Modified
2026-04-09T21:45:26.731719Z
Summary
[none]
Details

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

Database specific
{
    "license": "CC-BY-4.0",
    "sources": [
        {
            "id": "CVE-2023-25136",
            "modified": "2024-11-21T07:49:10.877Z",
            "published": "2023-02-03T06:15:09.350Z",
            "imported": "2026-04-09T14:56:18.850Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25136",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-25136"
        }
    ]
}
References

Affected packages

Julia / OpenSSH_jll

Package

Name
OpenSSH_jll
Purl
pkg:julia/OpenSSH_jll?uuid=9bd350c2-7e96-507f-8002-3f2e150b4e1b

Affected ranges

Type
SEMVER
Events
Introduced
8.9.0+0
Fixed
9.1.0+0

Database specific

source
"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-66.json"