Medium severity4.4OSV Advisory· Published Sep 17, 2025· Updated Apr 15, 2026
CVE-2025-59339
CVE-2025-59339
Description
The Bastion provides authentication, authorization, traceability and auditability for SSH accesses. Session-recording ttyrec files, may be handled by the provided osh-encrypt-rsync script that is a helper to rotate, encrypt, sign, copy, and optionally move them to a remote storage periodically, if configured to. When running, the script properly rotates and encrypts the files using the provided GPG key(s), but silently fails to sign them, even if asked to.
Affected products
1- Range: v3.00.00, v3.00.01, v3.00.02, …
Patches
2f8694351e8ebchore: bump version number to v3.22.00
1 file changed · +1 −1
lib/perl/OVH/Bastion.pm+1 −1 modified@@ -5,7 +5,7 @@ use common::sense; use Fcntl; use POSIX qw(strftime); -our $VERSION = '3.21.00'; +our $VERSION = '3.22.00'; BEGIN { # only used by the handler below
9bc85ec3f4b7fix: sign files when encrypting
1 file changed · +1 −0
bin/cron/osh-encrypt-rsync.pl+1 −0 modified@@ -74,6 +74,7 @@ sub gpg_encrypt { my %params = @_; my @cmd = qw{ gpg --batch --yes --trust-model always --encrypt }; if ($params{'signkey'}) { + push @cmd, qw{ --sign }; push @cmd, qw{ --passphrase-fd 0 }; push @cmd, qw{ --pinentry-mode loopback } if is_new_gpg(); push @cmd, '--local-user', $params{'signkey'};
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
2News mentions
0No linked articles in our index yet.