In Sequoia before 2.1.0, aeskeyunwrap panics if passed a ciphertext that is too short. A remote attacker can take advantage of this issue to crash an application by sending a victim an encrypted message with a crafted PKESK or SKESK packet.
{
"binaries": [
{
"binary_name": "librust-sequoia-openpgp+bzip2-dev",
"binary_version": "1.7.0-6"
},
{
"binary_name": "librust-sequoia-openpgp+compression-bzip2-dev",
"binary_version": "1.7.0-6"
},
{
"binary_name": "librust-sequoia-openpgp+compression-deflate-dev",
"binary_version": "1.7.0-6"
},
{
"binary_name": "librust-sequoia-openpgp+compression-dev",
"binary_version": "1.7.0-6"
},
{
"binary_name": "librust-sequoia-openpgp+default-dev",
"binary_version": "1.7.0-6"
},
{
"binary_name": "librust-sequoia-openpgp+flate2-dev",
"binary_version": "1.7.0-6"
},
{
"binary_name": "librust-sequoia-openpgp+nettle-dev",
"binary_version": "1.7.0-6"
},
{
"binary_name": "librust-sequoia-openpgp-dev",
"binary_version": "1.7.0-6"
}
]
}