Signed to Unsigned Conversion Error Affecting sequoia-openpgp package, versions <2.1.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.2% (42nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-SEQUOIAOPENPGP-14413725
  • published14 Dec 2025
  • disclosed14 Dec 2025
  • creditJan Różański

Introduced: 14 Dec 2025

CVE-2025-67897  (opens in a new tab)
CWE-195  (opens in a new tab)

How to fix?

Upgrade sequoia-openpgp to version 2.1.0 or higher.

Overview

sequoia-openpgp is a This crate aims to provide a complete implementation of OpenPGP as defined by RFC 4880 as well as some extensions (e.g., RFC 6637, which describes ECC cryptography for OpenPGP. This includes support for unbuffered message processing.

Affected versions of this package are vulnerable to Signed to Unsigned Conversion Error in the aes_key_unwrap function when handling a ciphertext that is too short. An attacker can cause a crash of the application by sending a specially crafted encrypted message containing a malformed PKESK or SKESK packet.

CVSS Base Scores

version 4.0
version 3.1