CVE-2019-13050

Priority
Description
Interaction between the sks-keyserver code through 1.2.0 of the SKS
keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG
keyserver configuration line referring to a host on the SKS keyserver
network. Retrieving data from this network may cause a persistent denial of
service, because of a Certificate Spamming Attack.
Notes
mdeslaurthis is a weakness in the PGP keyserver design.
amurraygnupg upstream has 2 mitigations for this - firstly, don't import
key signatures by default anymore, and to fallback to only import
self-signatures on very large keyblocks
mdeslauras of 2020-01-06, there is no ideal fix for this issue
marking this CVE as deferred until a complete fix is available
Package
Source: gnupg (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):deferred (2020-01-06)
Ubuntu 14.04 ESM (Trusty Tahr):deferred (2020-01-06)
Ubuntu 16.04 LTS (Xenial Xerus):deferred (2020-01-06)
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan Ermine):DNE
Ubuntu 20.04 (Focal Fossa):DNE
Package
Source: sks (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):deferred (2020-01-06)
Ubuntu 18.04 LTS (Bionic Beaver):deferred (2020-01-06)
Ubuntu 19.04 (Disco Dingo):ignored (reached end-of-life)
Ubuntu 19.10 (Eoan Ermine):deferred (2020-01-06)
Ubuntu 20.04 (Focal Fossa):deferred (2020-01-06)
More Information

Updated: 2020-01-23 20:46:51 UTC (commit b4629892d998f2ede31f59bb7508dc50a92ac664)