There is a denial-of-service vulnerability in sequoia-openpgp, our crate providing a low-level interface to our OpenPGP implementation. When triggered, the process will enter an infinite loop.
Many thanks to Andrew Gallagher for disclosing the issue to us.
Any software directly or indirectly using the interface sequoia_openpgp::cert::raw::RawCertParser
. Notably, this includes all
software using the sequoia_cert_store
crate.
The RawCertParser
does not advance the input stream when encountering unsupported cert (primary key) versions, resulting in an infinite loop.
The fix introduces a new raw-cert-specific cert::raw::Error::UnuspportedCert
.
openpgp::cert::raw::RawCertParser
. Notably, this includes all software using the sequoia_cert_store
crate.{ "github_reviewed_at": "2024-06-26T19:10:15Z", "nvd_published_at": null, "cwe_ids": [ "CWE-835" ], "github_reviewed": true, "severity": "LOW" }