CVE-2019-6690

Priority
Description
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to
decrypt other ciphertext than intended. To perform the attack, the
passphrase to gnupg must be controlled by the adversary and the ciphertext
should be trusted. Related to a "CWE-20: Improper Input Validation" issue
affecting the affect functionality component.
Ubuntu-Description
It was discovered that python-gnupg incorrectly handled the GPG passphrase. A
remote attacker could send a specially crafted passphrase that would allow
them to control the output of encryption and decryption operations.
Notes
Package
Upstream:released (0.4.4-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):released (0.4.1-1ubuntu1.18.04.1)
Ubuntu 20.04 LTS (Focal Fossa):needed
Ubuntu 20.10 (Groovy Gorilla):needed
More Information

Updated: 2020-09-09 23:30:36 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)