logo
DATABASE RESOURCES PRICING ABOUT US

CVE-2019-13050

Description

Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.


Affected Software


CPE Name Name Version
gnupg:gnupg gnupg 2.2.16
sks_keyserver_project:sks_keyserver sks keyserver project sks keyserver 1.2.0
fedoraproject:fedora fedoraproject fedora 29
fedoraproject:fedora fedoraproject fedora 30
opensuse:leap opensuse leap 15.0
opensuse:leap opensuse leap 15.1
f5:traffix_signaling_delivery_controller f5 traffix signaling delivery controller 5.1.0

Related