The vulnerability lies in the aes_key_unwrap function within the sequoia-openpgp crate. The function is supposed to handle AES key unwrapping as specified in RFC 6637. However, it fails to properly validate the length of the input ciphertext before performing calculations on it. Specifically, the calculation let n = c.len() / 8 - 1; can lead to a subtraction overflow if the ciphertext is too short. c is a slice of the ciphertext starting from the 8th byte. If the total length of the ciphertext is less than 16 bytes, c.len() will be less than 8, causing the division to be 0 and the subtraction to underflow. This underflow results in a panic, which can be triggered remotely by sending a crafted encrypted message, leading to a denial of service. The patch for this vulnerability introduces a check to ensure the ciphertext is at least 16 bytes long, thus preventing the underflow.