python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1675-1 | python-gnupg security update |
Debian DLA |
DLA-2862-1 | python-gnupg security update |
Github GHSA |
GHSA-2fch-jvg5-crf6 | Improper Input Validation python-gnupg |
Ubuntu USN |
USN-3964-1 | python-gnupg vulnerabilities |
Ubuntu USN |
USN-4839-1 | python-gnupg vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T20:31:04.140Z
Reserved: 2019-01-23T00:00:00
Link: CVE-2019-6690
No data.
Status : Modified
Published: 2019-03-21T16:01:09.077
Modified: 2024-11-21T04:46:57.777
Link: CVE-2019-6690
OpenCVE Enrichment
No data.
Debian DLA
Github GHSA
Ubuntu USN