UBUNTU-CVE-2024-58261

Source
https://ubuntu.com/security/CVE-2024-58261
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-58261.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2024-58261
Upstream
Published
2025-07-27T20:15:00Z
Modified
2025-07-31T05:07:32Z
Severity
  • 2.9 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

The sequoia-openpgp crate 1.13.0 before 1.21.0 for Rust allows an infinite loop of "Reading a cert: Invalid operation: Not a Key packet" messages for RawCertParser operations that encounter an unsupported primary key type.

References

Affected packages

Ubuntu:22.04:LTS / rust-sequoia-openpgp

Package

Name
rust-sequoia-openpgp
Purl
pkg:deb/ubuntu/rust-sequoia-openpgp@1.7.0-6?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.1.0-3
1.3.0-4
1.7.0-6

Ubuntu:24.04:LTS / rust-sequoia-openpgp

Package

Name
rust-sequoia-openpgp
Purl
pkg:deb/ubuntu/rust-sequoia-openpgp@1.19.0-1build1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.16.0-1
1.17.0-1
1.17.0-2
1.18.0-1
1.19.0-1
1.19.0-1build1