CVE-2022-3219
Publication date 23 February 2023
Last updated 31 March 2026
Ubuntu priority
Cvss 3 Severity Score
Description
GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| gnupg | 22.04 LTS jammy | Not in release |
| 20.04 LTS focal | Not in release | |
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Ignored end of standard support | |
| 14.04 LTS trusty | Ignored end of standard support | |
| gnupg2 | 25.10 questing | Ignored |
| 24.04 LTS noble | Ignored | |
| 22.04 LTS jammy | Ignored | |
| 20.04 LTS focal | Ignored end of standard support, was ignored | |
| 18.04 LTS bionic | Ignored end of standard support, was ignored | |
| 16.04 LTS xenial | Ignored end of standard support | |
| 14.04 LTS trusty | Ignored end of standard support |
Notes
mdeslaur
per the upstream gnupg bug, GnuPG developers will not be fixing this issue. We will not be fixing this issue in Ubuntu either. Marking as ignored.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | None |
| Availability impact | Low |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |