First published: Thu Sep 15 2022(Updated: )
GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB; see $URL and the surrounding email threads for more details and test-cases. The reporter has some proposed patches at <a href="https://dev.gnupg.org/D556">https://dev.gnupg.org/D556</a> (and in oss-security / gnupg-devel threads); mostly these flag/reject compressed packets and indeterminate-length packets in contexts where they make no sense and arguably are not within the spec (certificates, keys, detached signatures).
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GnuPG |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2127010 is not explicitly defined but may cause performance issues due to GnuPG spinning on crafted inputs.
To fix REDHAT-BUG-2127010, apply the proposed patches provided by the vulnerability reporter.
REDHAT-BUG-2127010 can lead to significant performance degradation when processing specially crafted public keys.
Currently, there is no official workaround for REDHAT-BUG-2127010.
REDHAT-BUG-2127010 affects GnuPG software, but specific version details are not provided in the report.