Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 861446 (CVE-2022-3219) - app-crypt/gnupg: denial of service issue (resource consumption) using compressed packets
Summary: app-crypt/gnupg: denial of service issue (resource consumption) using compres...
Alias: CVE-2022-3219
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
Whiteboard: A3 [upstream]
Depends on:
Reported: 2022-07-27 11:37 UTC by Hank Leininger
Modified: 2023-02-26 17:13 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Hank Leininger 2022-07-27 11:37:18 UTC
GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB; see $URL and the surrounding email threads for more details and test-cases.

The reporter has some proposed patches at (and in oss-security / gnupg-devel threads); mostly these flag/reject compressed packets and indeterminate-length packets in contexts where they make no sense and arguably are not within the spec (certificates, keys, detached signatures).

No CVE has been assigned yet AFAIK.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-02-26 17:13:12 UTC
According to werner on the issue (, "This specificiation is a draft which has not even been discussed in the WG. In any case gpg won't implement this because it would break processing of existing data."