Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2022-3219

Published: 23 February 2023

GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.

Notes

AuthorNote
mdeslaur
per the upstream gnupg bug, the change will not be applied
as of 2022-09-28, proposed patch has not been accepted by
upstream developers

Priority

Low

Cvss 3 Severity Score

3.3

Score breakdown

Status

Package Release Status
gnupg2
Launchpad, Ubuntu, Debian
bionic Deferred
(2022-09-28)
focal Deferred
(2022-09-28)
jammy Deferred
(2022-09-28)
kinetic Ignored
(end of life, was deferred [2022-09-28])
xenial Deferred
(2022-09-28)
trusty Ignored
(end of standard support)
upstream Needs triage

lunar Deferred
(2022-09-28)
Patches:
other: https://dev.gnupg.org/D556
gnupg
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

jammy Does not exist

upstream Needs triage

trusty Deferred
(2022-09-28)
xenial Deferred
(2022-09-28)

Severity score breakdown

Parameter Value
Base score 3.3
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact Low
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L