Russh is a Rust SSH client & server library. In versions 0.54.0 and below, the channel window adjust message of the SSH protocol is used to track the free space in the receive buffer of the other side of a channel. The current implementation takes the value from the message and adds it to an internal state value. This can result in a integer overflow. If the Rust code is compiled with overflow checks, it will panic. A malicious client can crash a server. This is fixed in version 0.54.1.
History

Tue, 05 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 05 Aug 2025 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 05 Aug 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Eugeny
Eugeny russh
Rust-lang
Rust-lang russh
Vendors & Products Eugeny
Eugeny russh
Rust-lang
Rust-lang russh

Tue, 05 Aug 2025 00:45:00 +0000

Type Values Removed Values Added
Description Russh is a Rust SSH client & server library. In versions 0.54.0 and below, the channel window adjust message of the SSH protocol is used to track the free space in the receive buffer of the other side of a channel. The current implementation takes the value from the message and adds it to an internal state value. This can result in a integer overflow. If the Rust code is compiled with overflow checks, it will panic. A malicious client can crash a server. This is fixed in version 0.54.1.
Title Russh is missing an overflow check during channel windows adjust
Weaknesses CWE-190
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-08-05T14:44:05.415Z

Reserved: 2025-07-29T16:50:28.395Z

Link: CVE-2025-54804

cve-icon Vulnrichment

Updated: 2025-08-05T14:43:58.052Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-05T01:15:42.550

Modified: 2025-08-05T15:15:31.740

Link: CVE-2025-54804

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-08-05T00:05:20Z

Links: CVE-2025-54804 - Bugzilla