Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.

Project Subscriptions

Vendors Products
Traffix Signaling Delivery Controller Subscribe
Fedoraproject Subscribe
Opensuse Subscribe
Enterprise Linux Subscribe
Sks Keyserver Project Subscribe
Sks Keyserver Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-4610 Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
Ubuntu USN Ubuntu USN USN-5431-1 GnuPG vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:41:09.920Z

Reserved: 2019-06-29T00:00:00

Link: CVE-2019-13050

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-06-29T17:15:08.627

Modified: 2024-11-21T04:24:06.410

Link: CVE-2019-13050

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-06-29T00:00:00Z

Links: CVE-2019-13050 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses