python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-1675-1 | python-gnupg security update |
![]() |
DLA-2862-1 | python-gnupg security update |
![]() |
GHSA-2fch-jvg5-crf6 | Improper Input Validation python-gnupg |
![]() |
USN-3964-1 | python-gnupg vulnerabilities |
![]() |
USN-4839-1 | python-gnupg vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T20:31:04.140Z
Reserved: 2019-01-23T00:00:00
Link: CVE-2019-6690

No data.

Status : Modified
Published: 2019-03-21T16:01:09.077
Modified: 2024-11-21T04:46:57.777
Link: CVE-2019-6690


No data.