VYPR
Medium severity4.4OSV Advisory· Published Sep 17, 2025· Updated Apr 15, 2026

CVE-2025-59339

CVE-2025-59339

Description

The Bastion provides authentication, authorization, traceability and auditability for SSH accesses. Session-recording ttyrec files, may be handled by the provided osh-encrypt-rsync script that is a helper to rotate, encrypt, sign, copy, and optionally move them to a remote storage periodically, if configured to. When running, the script properly rotates and encrypts the files using the provided GPG key(s), but silently fails to sign them, even if asked to.

Affected products

1

Patches

2
f8694351e8eb

chore: bump version number to v3.22.00

https://github.com/ovh/the-bastionStéphane LesimpleSep 17, 2025via osv
1 file changed · +1 1
  • lib/perl/OVH/Bastion.pm+1 1 modified
    @@ -5,7 +5,7 @@ use common::sense;
     use Fcntl;
     use POSIX qw(strftime);
     
    -our $VERSION = '3.21.00';
    +our $VERSION = '3.22.00';
     
     BEGIN {
         # only used by the handler below
    
9bc85ec3f4b7

fix: sign files when encrypting

https://github.com/ovh/the-bastionStoiko IvanovJun 24, 2025via osv
1 file changed · +1 0
  • bin/cron/osh-encrypt-rsync.pl+1 0 modified
    @@ -74,6 +74,7 @@ sub gpg_encrypt {
         my %params = @_;
         my @cmd    = qw{ gpg --batch --yes --trust-model always --encrypt };
         if ($params{'signkey'}) {
    +        push @cmd, qw{ --sign };
             push @cmd, qw{ --passphrase-fd 0 };
             push @cmd, qw{ --pinentry-mode loopback } if is_new_gpg();
             push @cmd, '--local-user', $params{'signkey'};
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.