Skip to content

Commit cf81d76

Browse files
1 parent 58d4f88 commit cf81d76

File tree

2 files changed

+20
-4
lines changed

2 files changed

+20
-4
lines changed

advisories/github-reviewed/2024/12/GHSA-9rmp-2568-59rv/GHSA-9rmp-2568-59rv.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9rmp-2568-59rv",
4-
"modified": "2024-12-05T19:05:47Z",
4+
"modified": "2025-12-26T16:30:25Z",
55
"published": "2024-12-05T17:30:52Z",
66
"aliases": [
77
"CVE-2024-53856"
88
],
99
"summary": "rPGP Panics on Malformed Untrusted Input",
10-
"details": "During a security audit, [Radically Open Security](https://www.radicallyopensecurity.com/) discovered several reachable edge cases which allow an attacker to trigger `rpgp` crashes by providing crafted data.\n\n### Impact\nWhen processing malformed input, `rpgp` can run into Rust panics which halt the program.\n\nThis can happen in the following scenarios:\n* Parsing OpenPGP messages from binary or armor format\n* Decrypting OpenPGP messages via `decrypt_with_password()`\n* Parsing or converting public keys\n* Parsing signed cleartext messages from armor format\n* Using malformed private keys to sign or encrypt\n\nGiven the affected components, we consider most attack vectors to be reachable by remote attackers during typical use cases of the `rpgp` library. The attack complexity is low since the malformed messages are generic, short, and require no victim-specific knowledge.\n\nThe result is a denial-of-service impact via program termination. There is no impact to confidentiality or integrity security properties.\n\n### Versions and Patches\nAll recent versions are affected by at least some of the above mentioned issues. \n\nThe vulnerabilities have been fixed with version `0.14.1`. We recommend all users to upgrade to this version.\n\n### References\n\n\nThe security audit was made possible by the [NLnet Foundation NGI Zero Core](https://nlnet.nl/core/) grant program [for rpgp](https://nlnet.nl/project/rPGP-cryptorefresh/).\n",
10+
"details": "During a security audit, [Radically Open Security](https://www.radicallyopensecurity.com/) discovered several reachable edge cases which allow an attacker to trigger `rpgp` crashes by providing crafted data.\n\n### Impact\nWhen processing malformed input, `rpgp` can run into Rust panics which halt the program.\n\nThis can happen in the following scenarios:\n* Parsing OpenPGP messages from binary or armor format\n* Decrypting OpenPGP messages via `decrypt_with_password()`\n* Parsing or converting public keys\n* Parsing signed cleartext messages from armor format\n* Using malformed private keys to sign or encrypt\n\nGiven the affected components, we consider most attack vectors to be reachable by remote attackers during typical use cases of the `rpgp` library. The attack complexity is low since the malformed messages are generic, short, and require no victim-specific knowledge.\n\nThe result is a denial-of-service impact via program termination. There is no impact to confidentiality or integrity security properties.\n\n### Versions and Patches\nAll recent versions are affected by at least some of the above mentioned issues. \n\nThe vulnerabilities have been fixed with version `0.14.1`. We recommend all users to upgrade to this version.\n\n### References\n\n\nThe security audit was made possible by the [NLnet Foundation NGI Zero Core](https://nlnet.nl/core/) grant program [for rpgp](https://nlnet.nl/project/rPGP-cryptorefresh/).",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
@@ -51,6 +51,10 @@
5151
{
5252
"type": "PACKAGE",
5353
"url": "https://github.com/rpgp/rpgp"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://rustsec.org/advisories/RUSTSEC-2024-0447.html"
5458
}
5559
],
5660
"database_specific": {

advisories/github-reviewed/2025/12/GHSA-pcqx-8qww-7f4v/GHSA-pcqx-8qww-7f4v.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pcqx-8qww-7f4v",
4-
"modified": "2025-12-16T20:11:05Z",
4+
"modified": "2025-12-26T16:30:12Z",
55
"published": "2025-12-15T18:30:39Z",
66
"aliases": [
77
"CVE-2025-13888"
@@ -28,7 +28,7 @@
2828
"introduced": "0"
2929
},
3030
{
31-
"last_affected": "1.17.0-rc5"
31+
"fixed": "1.16.2"
3232
}
3333
]
3434
}
@@ -40,6 +40,14 @@
4040
"type": "ADVISORY",
4141
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13888"
4242
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/redhat-developer/gitops-operator/pull/897"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/redhat-developer/gitops-operator/commit/bc6ac3e03d7c8b3db5d8f1770c868396a4c2dcef"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://access.redhat.com/errata/RHSA-2025:23203"
@@ -63,6 +71,10 @@
6371
{
6472
"type": "PACKAGE",
6573
"url": "https://github.com/redhat-developer/gitops-operator"
74+
},
75+
{
76+
"type": "WEB",
77+
"url": "https://github.com/redhat-developer/gitops-operator/releases/tag/v1.16.2"
6678
}
6779
],
6880
"database_specific": {

0 commit comments

Comments
 (0)