First published: Thu Sep 15 2022(Updated: )
GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB; see $URL and the surrounding email threads for more details and test-cases. The reporter has some proposed patches at <a href="https://dev.gnupg.org/D556">https://dev.gnupg.org/D556</a> (and in oss-security / gnupg-devel threads); mostly these flag/reject compressed packets and indeterminate-length packets in contexts where they make no sense and arguably are not within the spec (certificates, keys, detached signatures).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GnuPG |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this GnuPG vulnerability is CVE-2022-3219.
CVE-2022-3219 has a severity rating of low.
GnuPG can be made to spin on a relatively small input, such as crafting a public key with thousands of signatures attached.
You can check if your GnuPG installation is affected by CVE-2022-3219 by checking the version and applying any available patches or updates.
Yes, you can find more information about CVE-2022-3219 at the following references: [link1], [link2], [link3].