Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • Adélie Package Tree Adélie Package Tree
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 352
    • Issues 352
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 21
    • Merge requests 21
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Releases
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • Adélie Linux
  • Adélie Package TreeAdélie Package Tree
  • Issues
  • #142

Closed
Open
Created Jul 31, 2019 by Emily@emily🤖

user/gnupg: CVE-2019-13050: SKS keyserver attacks

Bugzilla ID 142
Alias(es) CVE-2019-13050
Reporter Max Rees (sroracle)
Assignee Max Rees (sroracle)
Reported 2019-07-31 07:04:18 -0500
Modified 2019-08-04 19:22:49 -0500
Status RESOLVED FIXED
Version 1.0-BETA3
Hardware Adélie Linux / All
Importance --- / normal
URL https://nvd.nist.gov/vuln/detail/CVE-2019-13050

Description

Interaction between the sks-keyserver code through 1.2.0 of the SKS
keyserver network, and GnuPG through 2.2.16, makes it risky to have a
GnuPG keyserver configuration line referring to a host on the SKS
keyserver network. Retrieving data from this network may cause a
persistent denial of service, because of a Certificate Spamming
Attack.

Edited Feb 02, 2022 by Zach van Rijn
Assignee
Assign to
Time tracking