First published: Sat Jun 29 2019(Updated: )
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gnupg Gnupg | <=2.2.16 | |
Sks Keyserver Project Sks Keyserver | <=1.2.0 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
F5 Traffix Signaling Delivery Controller | >=5.0.0<=5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is CVE-2019-13050.
CVE-2019-13050 has a severity rating of 7.5 (High).
CVE-2019-13050 affects Gnupg, Sks Keyserver Project Sks Keyserver, Fedora, openSUSE Leap, and Apple High Sierra.
CVE-2019-13050 can cause a persistent denial of service by retrieving data from the SKS keyserver network.
Yes, you can find more information about CVE-2019-13050 at the following links: [Link1], [Link2], [Link3].