GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2022-3219 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2127010 | Issue Tracking Third Party Advisory |
| https://dev.gnupg.org/D556 | Patch |
| https://dev.gnupg.org/T5993 | Patch |
| https://marc.info/?l=oss-security&m=165696590211434&w=4 | Mailing List Patch |
| https://security.netapp.com/advisory/ntap-20230324-0001/ | Third Party Advisory |
| https://access.redhat.com/security/cve/CVE-2022-3219 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2127010 | Issue Tracking Third Party Advisory |
| https://dev.gnupg.org/D556 | Patch |
| https://dev.gnupg.org/T5993 | Patch |
| https://marc.info/?l=oss-security&m=165696590211434&w=4 | Mailing List Patch |
| https://security.netapp.com/advisory/ntap-20230324-0001/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:19
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://access.redhat.com/security/cve/CVE-2022-3219 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2127010 - Issue Tracking, Third Party Advisory | |
| References | () https://dev.gnupg.org/D556 - Patch | |
| References | () https://dev.gnupg.org/T5993 - Patch | |
| References | () https://marc.info/?l=oss-security&m=165696590211434&w=4 - Mailing List, Patch | |
| References | () https://security.netapp.com/advisory/ntap-20230324-0001/ - Third Party Advisory |
26 May 2023, 16:31
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.3 |
| References | (CONFIRM) https://security.netapp.com/advisory/ntap-20230324-0001/ - Third Party Advisory |
24 Mar 2023, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Mar 2023, 15:46
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://access.redhat.com/security/cve/CVE-2022-3219 - Third Party Advisory | |
| References | (MISC) https://marc.info/?l=oss-security&m=165696590211434&w=4 - Mailing List, Patch | |
| References | (MISC) https://dev.gnupg.org/D556 - Patch | |
| References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2127010 - Issue Tracking, Third Party Advisory | |
| References | (MISC) https://dev.gnupg.org/T5993 - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | CWE-787 | |
| CPE | cpe:2.3:a:gnupg:gnupg:-:*:*:*:*:*:*:* |
23 Feb 2023, 22:58
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-02-23 20:15
Updated : 2025-03-12 21:15
NVD link : CVE-2022-3219
Mitre link : CVE-2022-3219
CVE.ORG link : CVE-2022-3219
JSON object : View
Products Affected
gnupg
- gnupg
CWE
CWE-787
Out-of-bounds Write
