CVE-2019-13050 PUBLISHED

Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.

EPSS 0.57% · 68.3th percentile

Risk Scores

EPSS Score
0.57%
68.3th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSgnupg22.2.4-1ubuntu1.4, 2.2.4-1ubuntu1.3, 2.1.15-1ubuntu8
Ubuntu:20.04:LTSsks0, 1.1.6-14
Ubuntu:Pro:14.04:LTSgnupg1.4.16-1ubuntu2.4, 1.4.16-1ubuntu2.5, 1.4.16-1ubuntu2.6
Ubuntu:Pro:16.04:LTSgnupg22.1.11-6ubuntu2.1+esm1, 2.1.11-6ubuntu2.1+esm2, 2.1.11-6ubuntu2.1+esm3
Ubuntu:16.04:LTSsks0, 1.1.5-4, 1.1.5-4build1
Ubuntu:Pro:16.04:LTSgnupg1.4.20-1ubuntu2, 1.4.20-1ubuntu3, 1.4.20-1ubuntu3.1
Ubuntu:18.04:LTSsks0, 1.1.6-14, 1.1.6-13

Timeline

References

Open in Interactive Console →