Skip to main content

CVE-2025-54804: CWE-190: Integer Overflow or Wraparound in Eugeny russh

Medium
VulnerabilityCVE-2025-54804cvecve-2025-54804cwe-190
Published: Tue Aug 05 2025 (08/05/2025, 00:05:20 UTC)
Source: CVE Database V5
Vendor/Project: Eugeny
Product: russh

Description

Russh is a Rust SSH client & server library. In versions 0.54.0 and below, the channel window adjust message of the SSH protocol is used to track the free space in the receive buffer of the other side of a channel. The current implementation takes the value from the message and adds it to an internal state value. This can result in a integer overflow. If the Rust code is compiled with overflow checks, it will panic. A malicious client can crash a server. This is fixed in version 0.54.1.

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-29T16:50:28.395Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689154aead5a09ad00e467fb

Added to database: 8/5/2025, 12:47:42 AM

Last updated: 8/5/2025, 12:47:42 AM

Views: 1

Actions

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats