CVE-2024-58261
Rust vulnerability analysis and mitigation

Overview

The sequoia-openpgp crate versions 1.13.0 through 1.21.0 for Rust contains a vulnerability that allows an infinite loop of "Reading a cert: Invalid operation: Not a Key packet" messages when RawCertParser operations encounter an unsupported primary key type (RUSTSEC Advisory, NVD). The vulnerability was discovered and disclosed on June 26, 2024.

Technical details

The vulnerability stems from a flaw in the RawCertParser implementation where it fails to advance the input stream when encountering unsupported cert (primary key) versions, resulting in an infinite loop. The issue has been assigned CWE-835 (Loop with Unreachable Exit Condition). The vulnerability has received varying CVSS scores: NIST assigned a CVSS v3.1 base score of 7.5 (HIGH) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, while MITRE assigned a score of 2.9 (LOW) with vector CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N (NVD).

Impact

The vulnerability affects any software directly or indirectly using the sequoiaopenpgp::cert::raw::RawCertParser interface, notably including all software using the sequoiacert_store crate. When triggered, the process will enter an infinite loop, leading to a denial-of-service condition (RUSTSEC Advisory).

Mitigation and workarounds

The vulnerability has been fixed in version 1.21.0 of sequoia-openpgp, which introduces a new raw-cert-specific cert::raw::Error::UnuspportedCert to properly handle unsupported certificate versions. Users are advised to upgrade to version 1.21.0 or later. Systems using versions prior to 1.13.0 are not affected by this vulnerability (RUSTSEC Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65807HIGH8.4
  • RustRust
  • sd
NoNoDec 10, 2025
CVE-2025-66627HIGH7.8
  • RustRust
  • wasmi
NoYesDec 09, 2025
CVE-2025-67487MEDIUM5.5
  • RustRust
  • static-web-server
NoYesDec 09, 2025
CVE-2025-66622LOW1.3
  • RustRust
  • matrix-sdk-base
NoYesDec 09, 2025
RUSTSEC-2025-0135N/AN/A
  • RustRust
  • matrix-sdk-base
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management