Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
07 Nov 2023, 03:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-06-29 17:15
Updated : 2024-02-28 17:08
NVD link : CVE-2019-13050
Mitre link : CVE-2019-13050
CVE.ORG link : CVE-2019-13050
JSON object : View
Products Affected
sks_keyserver_project
- sks_keyserver
fedoraproject
- fedora
gnupg
- gnupg
f5
- traffix_signaling_delivery_controller
opensuse
- leap
CWE
CWE-295
Improper Certificate Validation