python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
History
21 Nov 2024, 04:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00008.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00058.html - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/151341/Python-GnuPG-0.4.3-Improper-Input-Validation.html - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/106756 - Broken Link | |
References | () https://blog.hackeriet.no/cve-2019-6690-python-gnupg-vulnerability/ - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/02/msg00021.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WMV6XNPPL3VB3RQRFFOBCJ3AGWC4K47/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6KYZMN2PWXY4ENZVJUVTGFBVYEVY7II/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4VFRUG56542LTYK4444TPJBGR57MT25/ - | |
References | () https://pypi.org/project/python-gnupg/#history - Product, Third Party Advisory | |
References | () https://seclists.org/bugtraq/2019/Jan/41 - Mailing List, Third Party Advisory | |
References | () https://usn.ubuntu.com/3964-1/ - Third Party Advisory |
07 Nov 2023, 03:13
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-03-21 16:01
Updated : 2024-11-21 04:46
NVD link : CVE-2019-6690
Mitre link : CVE-2019-6690
CVE.ORG link : CVE-2019-6690
JSON object : View
Products Affected
canonical
- ubuntu_linux
python
- python-gnupg
opensuse
- leap
suse
- linux_enterprise
- backports
debian
- debian_linux
CWE
CWE-20
Improper Input Validation