vulnerability
Arch Linux: Arbitrary code execution (CVE-2020-25125)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Sep 3, 2020 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Sep 3, 2020
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
Importing an OpenPGP key having a preference list for AEAD algorithms will lead to an array overflow and thus often to a crash or other undefined behaviour.
Importing an arbitrary key can often easily be triggered by an attacker and thus triggering this bug. Exploiting the bug aside from crashes is not trivial but likely possible for a dedicated attacker. The major hurdle for an attacker is that only every second byte is under their control with every first byte having a fixed value of 0x04.
Software distribution verification should not be affected by this bug because such a system uses a curated list of keys.
Importing an arbitrary key can often easily be triggered by an attacker and thus triggering this bug. Exploiting the bug aside from crashes is not trivial but likely possible for a dedicated attacker. The major hurdle for an attacker is that only every second byte is under their control with every first byte having a fixed value of 0x04.
Software distribution verification should not be affected by this bug because such a system uses a curated list of keys.
Solution
arch-linux-upgrade-latest
References
- CVE-2020-25125
- https://attackerkb.com/topics/CVE-2020-25125
- URL-http://www.openwall.com/lists/oss-security/2020/09/03/4
- URL-http://www.openwall.com/lists/oss-security/2020/09/03/5
- URL-https://bugzilla.opensuse.org/show_bug.cgi?id=1176034
- URL-https://dev.gnupg.org/T5050
- URL-https://dev.gnupg.org/rG8ec9573e57866dda5efb4677d4454161517484bc
- URL-https://lists.gnupg.org/pipermail/gnupg-announce/2020q3/000448.html
- URL-https://security.archlinux.org/ASA-202009-5
- CWE-120
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.