GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2022-3219 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2127010 | Issue Tracking Third Party Advisory |
https://dev.gnupg.org/D556 | Patch |
https://dev.gnupg.org/T5993 | Patch |
https://marc.info/?l=oss-security&m=165696590211434&w=4 | Mailing List Patch |
https://security.netapp.com/advisory/ntap-20230324-0001/ | Third Party Advisory |
Configurations
History
26 May 2023, 16:31
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20230324-0001/ - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.3 |
Information
Published : 2023-02-23 20:15
Updated : 2024-02-28 19:51
NVD link : CVE-2022-3219
Mitre link : CVE-2022-3219
CVE.ORG link : CVE-2022-3219
JSON object : View
Products Affected
gnupg
- gnupg
CWE
CWE-787
Out-of-bounds Write