python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
History
21 Nov 2024, 04:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00008.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00058.html - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/151341/Python-GnuPG-0.4.3-Improper-Input-Validation.html - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/106756 - Broken Link | |
References | () https://blog.hackeriet.no/cve-2019-6690-python-gnupg-vulnerability/ - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/02/msg00021.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WMV6XNPPL3VB3RQRFFOBCJ3AGWC4K47/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6KYZMN2PWXY4ENZVJUVTGFBVYEVY7II/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4VFRUG56542LTYK4444TPJBGR57MT25/ - | |
References | () https://pypi.org/project/python-gnupg/#history - Product, Third Party Advisory | |
References | () https://seclists.org/bugtraq/2019/Jan/41 - Mailing List, Third Party Advisory | |
References | () https://usn.ubuntu.com/3964-1/ - Third Party Advisory |
06 Apr 2022, 18:27
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4VFRUG56542LTYK4444TPJBGR57MT25/ - Broken Link | |
References | (BID) http://www.securityfocus.com/bid/106756 - Broken Link | |
References | (MISC) https://pypi.org/project/python-gnupg/#history - Product, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6KYZMN2PWXY4ENZVJUVTGFBVYEVY7II/ - Broken Link | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00008.html - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00058.html - Mailing List, Third Party Advisory | |
References | (BUGTRAQ) https://seclists.org/bugtraq/2019/Jan/41 - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WMV6XNPPL3VB3RQRFFOBCJ3AGWC4K47/ - Broken Link | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html - Mailing List, Third Party Advisory |
28 Dec 2021, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2019-03-21 16:01
Updated : 2024-11-21 04:46
NVD link : CVE-2019-6690
Mitre link : CVE-2019-6690
CVE.ORG link : CVE-2019-6690
JSON object : View
Products Affected
python
- python-gnupg
opensuse
- leap
canonical
- ubuntu_linux
suse
- backports
- linux_enterprise
debian
- debian_linux
CWE
CWE-20
Improper Input Validation