Description
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1675-1 | python-gnupg security update |
Debian DLA |
DLA-2862-1 | python-gnupg security update |
Github GHSA |
GHSA-2fch-jvg5-crf6 | Improper Input Validation python-gnupg |
Ubuntu USN |
USN-3964-1 | python-gnupg vulnerabilities |
Ubuntu USN |
USN-4839-1 | python-gnupg vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T20:31:04.140Z
Reserved: 2019-01-23T00:00:00.000Z
Link: CVE-2019-6690
No data.
Status : Modified
Published: 2019-03-21T16:01:09.077
Modified: 2024-11-21T04:46:57.777
Link: CVE-2019-6690
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Github GHSA
Ubuntu USN