Vulnerability Description
GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnupg | Gnupg | - |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2022-3219Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2127010Issue TrackingThird Party Advisory
- https://dev.gnupg.org/D556Patch
- https://dev.gnupg.org/T5993Patch
- https://marc.info/?l=oss-security&m=165696590211434&w=4Mailing ListPatch
- https://security.netapp.com/advisory/ntap-20230324-0001/Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2022-3219Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2127010Issue TrackingThird Party Advisory
- https://dev.gnupg.org/D556Patch
- https://dev.gnupg.org/T5993Patch
- https://marc.info/?l=oss-security&m=165696590211434&w=4Mailing ListPatch
- https://security.netapp.com/advisory/ntap-20230324-0001/Third Party Advisory
FAQ
What is CVE-2022-3219?
CVE-2022-3219 is a vulnerability with a CVSS score of 3.3 (LOW). GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.
How severe is CVE-2022-3219?
CVE-2022-3219 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-3219?
Check the references section above for vendor advisories and patch information. Affected products include: Gnupg Gnupg.