sequoia-pgp sequoia Crate up to 1.20.x on Rust RawCertParser infinite loop
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.3 | $0-$5k | 0.00 |
Summary
A vulnerability identified as problematic has been detected in sequoia-pgp sequoia Crate up to 1.20.x on Rust. This impacts the function RawCertParser. Performing a manipulation results in infinite loop.
This vulnerability is known as CVE-2024-58261. Attacking locally is a requirement. No exploit is available.
You should upgrade the affected component.
Details
A vulnerability, which was classified as problematic, was found in sequoia-pgp sequoia Crate up to 1.20.x on Rust. This affects the function RawCertParser. The manipulation with an unknown input leads to a infinite loop vulnerability. CWE is classifying the issue as CWE-835. The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. This is going to have an impact on availability. The summary by CVE is:
The sequoia-openpgp crate 1.13.0 before 1.21.0 for Rust allows an infinite loop of "Reading a cert: Invalid operation: Not a Key packet" messages for RawCertParser operations that encounter an unsupported primary key type.
The advisory is shared at rustsec.org. This vulnerability is uniquely identified as CVE-2024-58261 since 07/27/2025. The exploitability is told to be difficult. An attack has to be approached locally. Technical details are known, but no exploit is available.
Upgrading to version 1.21.0 eliminates this vulnerability.
The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2024-54821). Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔒VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.3VulDB Meta Temp Score: 4.3
VulDB Base Score: 2.5
VulDB Temp Score: 2.4
VulDB Vector: 🔒
VulDB Reliability: 🔍
NVD Base Score: 7.5
NVD Vector: 🔒
CNA Base Score: 2.9
CNA Vector (MITRE): 🔒
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploiting
Class: Infinite loopCWE: CWE-835 / CWE-404
CAPEC: 🔒
ATT&CK: 🔒
Physical: Partially
Local: Yes
Remote: Yes
Availability: 🔒
Status: Not defined
EPSS Score: 🔒
EPSS Percentile: 🔒
Price Prediction: 🔍
Current Price Estimation: 🔒
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔒
Upgrade: sequoia Crate 1.21.0
Timeline
07/27/2025 Advisory disclosed07/27/2025 CVE reserved
07/27/2025 VulDB entry created
08/07/2025 VulDB entry last update
Sources
Advisory: RUSTSEC-2024-0345Status: Confirmed
CVE: CVE-2024-58261 (🔒)
GCVE (CVE): GCVE-0-2024-58261
GCVE (VulDB): GCVE-100-317865
EUVD: 🔒
Entry
Created: 07/27/2025 22:51Updated: 08/07/2025 01:13
Changes: 07/27/2025 22:51 (67), 07/27/2025 23:10 (1), 07/28/2025 23:19 (1), 08/07/2025 01:13 (11)
Complete: 🔍
Cache ID: 216:614:103
No comments yet. Languages: en.
Please log in to comment.