7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.01 Low
EPSS
Percentile
83.6%
usn-5431-1
Low
Canonical Ubuntu
It was discovered that GnuPG was not properly processing keys with large amounts of signatures. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run sudo ua fix USN-5431-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dirmngr – 2.2.4-1ubuntu1.5 gpgv-static – 2.2.4-1ubuntu1.5 gpgv-win32 – 2.2.4-1ubuntu1.5 scdaemon – 2.2.4-1ubuntu1.5 gpgsm – 2.2.4-1ubuntu1.5 gpgv – 2.2.4-1ubuntu1.5 gpg – 2.2.4-1ubuntu1.5 gnupg-agent – 2.2.4-1ubuntu1.5 gnupg2 – 2.2.4-1ubuntu1.5 gpgv2 – 2.2.4-1ubuntu1.5 gnupg-utils – 2.2.4-1ubuntu1.5 gnupg-l10n – 2.2.4-1ubuntu1.5 gpg-wks-server – 2.2.4-1ubuntu1.5 gpg-agent – 2.2.4-1ubuntu1.5 gnupg – 2.2.4-1ubuntu1.5 gpg-wks-client – 2.2.4-1ubuntu1.5 gpgconf – 2.2.4-1ubuntu1.5 No subscription required
CVEs contained in this USN include: CVE-2019-13050.
Severity is low unless otherwise noted.
Users of affected products are strongly encouraged to follow the mitigations below.
The Cloud Foundry project recommends upgrading the following releases:
2022-07-28: Initial vulnerability report published.
CPE | Name | Operator | Version |
---|---|---|---|
bionic stemcells | lt | 1.87 | |
cflinuxfs3 | lt | 0.302.0 | |
cf deployment | lt | 21.4.0 |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.01 Low
EPSS
Percentile
83.6%