{"id":"UBUNTU-CVE-2019-13050","details":"Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.","modified":"2026-02-04T04:36:21.077401Z","published":"2019-06-29T17:15:00Z","related":["USN-5431-1"],"upstream":["CVE-2019-13050"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-13050"},{"type":"REPORT","url":"https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f"},{"type":"REPORT","url":"https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html"},{"type":"REPORT","url":"https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5431-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2019-13050"}],"affected":[{"package":{"name":"gnupg","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/gnupg@1.4.16-1ubuntu2.6+esm2?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.4.14-1ubuntu2","1.4.15-1.1ubuntu1","1.4.15-1.1ubuntu2","1.4.15-2ubuntu1","1.4.16-1ubuntu1","1.4.16-1ubuntu2","1.4.16-1ubuntu2.1","1.4.16-1ubuntu2.3","1.4.16-1ubuntu2.4","1.4.16-1ubuntu2.5","1.4.16-1ubuntu2.6","1.4.16-1ubuntu2.6+esm1","1.4.16-1ubuntu2.6+esm2"],"ecosystem_specific":{"binaries":[{"binary_version":"1.4.16-1ubuntu2.6+esm2","binary_name":"gnupg"},{"binary_version":"1.4.16-1ubuntu2.6+esm2","binary_name":"gnupg-curl"},{"binary_version":"1.4.16-1ubuntu2.6+esm2","binary_name":"gpgv"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-13050.json"}},{"package":{"name":"gnupg","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/gnupg@1.4.20-1ubuntu3.3+esm3?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.4.18-7ubuntu1","1.4.19-6ubuntu1","1.4.20-1ubuntu1","1.4.20-1ubuntu2","1.4.20-1ubuntu3","1.4.20-1ubuntu3.1","1.4.20-1ubuntu3.2","1.4.20-1ubuntu3.3","1.4.20-1ubuntu3.3+esm2","1.4.20-1ubuntu3.3+esm3"],"ecosystem_specific":{"binaries":[{"binary_version":"1.4.20-1ubuntu3.3+esm3","binary_name":"gnupg"},{"binary_version":"1.4.20-1ubuntu3.3+esm3","binary_name":"gnupg-curl"},{"binary_version":"1.4.20-1ubuntu3.3+esm3","binary_name":"gpgv"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-13050.json"}},{"package":{"name":"gnupg2","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/gnupg2@2.1.11-6ubuntu2.1+esm3?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.0.28-3ubuntu1","2.0.28-3ubuntu2","2.1.11-6ubuntu1","2.1.11-6ubuntu2","2.1.11-6ubuntu2.1","2.1.11-6ubuntu2.1+esm1","2.1.11-6ubuntu2.1+esm2","2.1.11-6ubuntu2.1+esm3"],"ecosystem_specific":{"binaries":[{"binary_version":"2.1.11-6ubuntu2.1+esm3","binary_name":"dirmngr"},{"binary_version":"2.1.11-6ubuntu2.1+esm3","binary_name":"gnupg-agent"},{"binary_version":"2.1.11-6ubuntu2.1+esm3","binary_name":"gnupg2"},{"binary_version":"2.1.11-6ubuntu2.1+esm3","binary_name":"gpgsm"},{"binary_version":"2.1.11-6ubuntu2.1+esm3","binary_name":"gpgv2"},{"binary_version":"2.1.11-6ubuntu2.1+esm3","binary_name":"scdaemon"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-13050.json"}},{"package":{"name":"sks","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/sks@1.1.5-4build2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.1.5-4","1.1.5-4build1","1.1.5-4build2"],"ecosystem_specific":{"binaries":[{"binary_version":"1.1.5-4build2","binary_name":"sks"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-13050.json"}},{"package":{"name":"gnupg2","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/gnupg2@2.2.4-1ubuntu1.5?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.4-1ubuntu1.5"}]}],"versions":["2.1.15-1ubuntu8","2.2.4-1ubuntu1","2.2.4-1ubuntu1.1","2.2.4-1ubuntu1.2","2.2.4-1ubuntu1.3","2.2.4-1ubuntu1.4"],"ecosystem_specific":{"binaries":[{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"dirmngr"},{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"gnupg"},{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"gnupg-agent"},{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"gnupg-l10n"},{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"gnupg-utils"},{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"gnupg2"},{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"gpg"},{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"gpg-agent"},{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"gpg-wks-client"},{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"gpg-wks-server"},{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"gpgconf"},{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"gpgsm"},{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"gpgv"},{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"gpgv-static"},{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"gpgv-win32"},{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"gpgv2"},{"binary_version":"2.2.4-1ubuntu1.5","binary_name":"scdaemon"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-13050.json"}},{"package":{"name":"sks","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/sks@1.1.6-14?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.1.6-13","1.1.6-14"],"ecosystem_specific":{"binaries":[{"binary_version":"1.1.6-14","binary_name":"sks"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-13050.json"}},{"package":{"name":"sks","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/sks@1.1.6-14?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.1.6-14"],"ecosystem_specific":{"binaries":[{"binary_version":"1.1.6-14","binary_name":"sks"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-13050.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}