python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to
decrypt other ciphertext than intended. To perform the attack, the
passphrase to gnupg must be controlled by the adversary and the ciphertext
should be trusted. Related to a "CWE-20: Improper Input Validation" issue
affecting the affect functionality component.
Upstream:released (0.4.4-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):released (0.4.1-1ubuntu1.18.04.1)
Ubuntu 18.10 (Cosmic Cuttlefish):released (0.4.1-1ubuntu1.18.10.1)
Ubuntu 19.04 (Disco Dingo):released (0.4.3-1ubuntu1.19.04.1)
Ubuntu 19.10 (Eoan):needed
More Information

Updated: 2019-05-15 17:18:13 UTC (commit 2d71aefac924bf16479c12958688c37878e881eb)