GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2022-3219 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2127010 | Issue Tracking Third Party Advisory |
https://dev.gnupg.org/D556 | Patch |
https://dev.gnupg.org/T5993 | Patch |
https://marc.info/?l=oss-security&m=165696590211434&w=4 | Mailing List Patch |
https://security.netapp.com/advisory/ntap-20230324-0001/ | Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2022-3219 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2127010 | Issue Tracking Third Party Advisory |
https://dev.gnupg.org/D556 | Patch |
https://dev.gnupg.org/T5993 | Patch |
https://marc.info/?l=oss-security&m=165696590211434&w=4 | Mailing List Patch |
https://security.netapp.com/advisory/ntap-20230324-0001/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2022-3219 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2127010 - Issue Tracking, Third Party Advisory | |
References | () https://dev.gnupg.org/D556 - Patch | |
References | () https://dev.gnupg.org/T5993 - Patch | |
References | () https://marc.info/?l=oss-security&m=165696590211434&w=4 - Mailing List, Patch | |
References | () https://security.netapp.com/advisory/ntap-20230324-0001/ - Third Party Advisory |
26 May 2023, 16:31
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.3 |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20230324-0001/ - Third Party Advisory |
24 Mar 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-02-23 20:15
Updated : 2025-03-12 21:15
NVD link : CVE-2022-3219
Mitre link : CVE-2022-3219
CVE.ORG link : CVE-2022-3219
JSON object : View
Products Affected
gnupg
- gnupg
CWE
CWE-787
Out-of-bounds Write