Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2019-06-29 10:15
Updated : 2021-06-29 08:15
NVD link : CVE-2019-13050
Mitre link : CVE-2019-13050
JSON object : View
CWE
CWE-295
Improper Certificate Validation
Products Affected
gnupg
- gnupg
fedoraproject
- fedora
f5
- traffix_signaling_delivery_controller
opensuse
- leap
sks_keyserver_project
- sks_keyserver