Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ch5h-mpfr-fhxh

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.

Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.

Ссылки

EPSS

Процентиль: 71%
0.00695
Низкий

7.5 High

CVSS3

Дефекты

CWE-295
CWE-297

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 6 лет назад

Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.

CVSS3: 6.5
redhat
около 6 лет назад

Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.

CVSS3: 7.5
nvd
около 6 лет назад

Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.

suse-cvrf
почти 6 лет назад

Security update for gpg2

suse-cvrf
почти 6 лет назад

Security update for gpg2

EPSS

Процентиль: 71%
0.00695
Низкий

7.5 High

CVSS3

Дефекты

CWE-295
CWE-297