RUSTSEC-2025-0136

Source
https://rustsec.org/advisories/RUSTSEC-2025-0136
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2025-0136.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2025-0136
Aliases
Published
2025-11-07T12:00:00Z
Modified
2025-12-17T06:16:23.047289Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L CVSS Calculator
Summary
Underflow in aes_key_unwrap function
Details

The aes_key_unwrap function would panic if passed a ciphertext that was too short. In a debug build, it would panic due to a subtraction underflow. In a release build, it would use the small negative quantity to allocate a vector. Since the allocator expects an unsigned quantity, the negative value would be interpreted as a huge allocation. The allocator would then fail to allocate the memory and panic.

An attacker could trigger this panic by sending a victim an encrypted message whose PKESK or SKESK packet has been specially modified. When the victim decrypts the message, the program would crash.

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / sequoia-openpgp

Package

Name
sequoia-openpgp
View open source insights on deps.dev
Purl
pkg:cargo/sequoia-openpgp

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0
Fixed
2.1.0

Ecosystem specific

{
    "affects": {
        "os": [],
        "arch": [],
        "functions": [
            "sequoia_openpgp::crypto::ecdh::aes_key_unwrap"
        ]
    },
    "affected_functions": null
}

Database specific

categories

[
    "denial-of-service"
]

cvss

"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"

informational

null