CVE-2019-13050
Published: 29 June 2019
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
Notes
Author | Note |
---|---|
mdeslaur | this is a weakness in the PGP keyserver design. |
alexmurray | gnupg upstream has 2 mitigations for this - firstly, don't import key signatures by default anymore, and to fallback to only import self-signatures on very large keyblocks |
mdeslaur | as of 2020-01-06, there is no ideal fix for this issue marking this CVE as deferred until a complete fix is available |
sbeattie | gnupg mitigations landed in upstream in 2.2.17 with important fixes in 2.2.18 2.2.19-3ubuntu1 introduced a debian/ubuntu specific change to use keys.openpgp.org as the default keyserver any backports to address this issue will be complex and introduce changes in behavior sks in debian introduced very basic filtering in 1.1.6+git20210302.c3ba6d5a-1 |
rodrigo-zaiden | as of 2022-03-22, there is no upstream backport for gnupg 1.4 series. Backporting from 2.2 is too risky. |
Priority
Status
Package | Release | Status |
---|---|---|
gnupg Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
disco |
Does not exist
|
|
eoan |
Does not exist
|
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
lunar |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Deferred
(2022-03-22)
|
|
gnupg2 Launchpad, Ubuntu, Debian |
bionic |
Released
(2.2.4-1ubuntu1.5)
|
disco |
Ignored
(reached end-of-life)
|
|
eoan |
Ignored
(reached end-of-life)
|
|
focal |
Not vulnerable
(2.2.19-3ubuntu1)
|
|
groovy |
Not vulnerable
(2.2.19-3ubuntu1)
|
|
hirsute |
Not vulnerable
(2.2.19-3ubuntu1)
|
|
impish |
Not vulnerable
(2.2.19-3ubuntu1)
|
|
jammy |
Not vulnerable
(2.2.19-3ubuntu1)
|
|
kinetic |
Not vulnerable
(2.2.19-3ubuntu1)
|
|
lunar |
Not vulnerable
(2.2.19-3ubuntu1)
|
|
upstream |
Released
(2.2.17-3)
|
|
xenial |
Ignored
(change too intrusive)
|
|
Patches: upstream: https://dev.gnupg.org/rG15a425a1dfe60bd976b17671aa8e3d9aed12e1c0 upstream: https://dev.gnupg.org/rGadb120e663fc5e78f714976c6e42ae233c1990b0 upstream: https://dev.gnupg.org/rGa1f2f38dfb2ba5ed66d3aef66fc3be9b67f9b800 upstream: https://dev.gnupg.org/rG2b7151b0a57f5fe7d67fd76dfa1ba7a8731642c6 (possibly problematic) upstream: https://dev.gnupg.org/rGb6effaf4669b2c3707932e3c5f2f57df886d759e upstream: https://dev.gnupg.org/rG3c2cf5ea952015a441ee5701c41dadc63be60d87 |
||
sks Launchpad, Ubuntu, Debian |
bionic |
Deferred
(2020-01-06)
|
cosmic |
Ignored
(reached end-of-life)
|
|
disco |
Ignored
(reached end-of-life)
|
|
eoan |
Ignored
(reached end-of-life)
|
|
focal |
Deferred
(2020-01-06)
|
|
groovy |
Does not exist
|
|
hirsute |
Not vulnerable
(1.1.6+git20210302.c3ba6d5a-1)
|
|
impish |
Not vulnerable
(1.1.6+git20210302.c3ba6d5a-1)
|
|
jammy |
Not vulnerable
(1.1.6+git20210302.c3ba6d5a-1)
|
|
kinetic |
Not vulnerable
(1.1.6+git20210302.c3ba6d5a-1)
|
|
lunar |
Not vulnerable
(1.1.6+git20210302.c3ba6d5a-1)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(1.1.6+git20210302.c3ba6d5a-1)
|
|
xenial |
Deferred
(2020-01-06)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
- https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
- https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
- https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/
- https://ubuntu.com/security/notices/USN-5431-1
- NVD
- Launchpad
- Debian