CVE-2024-58261

Source
https://cve.org/CVERecord?id=CVE-2024-58261
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-58261.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-58261
Aliases
Downstream
Published
2025-07-27T20:15:24.810Z
Modified
2026-03-14T12:40:30.035681Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

The sequoia-openpgp crate 1.13.0 before 1.21.0 for Rust allows an infinite loop of "Reading a cert: Invalid operation: Not a Key packet" messages for RawCertParser operations that encounter an unsupported primary key type.

References

Affected packages

Git / gitlab.com/sequoia-pgp/sequoia

Affected ranges

Type
GIT
Repo
https://gitlab.com/sequoia-pgp/sequoia
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.13.0"
        },
        {
            "fixed": "1.21.0"
        }
    ]
}

Affected versions

autocrypt/v0.*
autocrypt/v0.25.0
autocrypt/v0.25.1
buffered-reader/v1.*
buffered-reader/v1.2.0
buffered-reader/v1.3.0
buffered-reader/v1.3.1
ipc/v0.*
ipc/v0.30.0
ipc/v0.30.1
ipc/v0.31.0
ipc/v0.32.0
ipc/v0.33.0
ipc/v0.34.0
ipc/v0.34.1
ipc/v0.35.0
net/v0.*
net/v0.26.0
net/v0.27.0
net/v0.28.0
openpgp/v1.*
openpgp/v1.13.0
openpgp/v1.14.0
openpgp/v1.15.0
openpgp/v1.16.0
openpgp/v1.17.0
openpgp/v1.18.0
openpgp/v1.19.0
openpgp/v1.20.0
sq/v0.*
sq/v0.28.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-58261.json"