CVE-2019-6690

Priority
Description
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to
decrypt other ciphertext than intended. To perform the attack, the
passphrase to gnupg must be controlled by the adversary and the ciphertext
should be trusted. Related to a "CWE-20: Improper Input Validation" issue
affecting the affect functionality component.
Notes
Package
Upstream:released (0.4.4-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):released (0.4.1-1ubuntu1.18.04.1)
Ubuntu 19.10 (Eoan Ermine):needed
Ubuntu 20.04 (Focal Fossa):needed
More Information

Updated: 2020-01-29 19:03:39 UTC (commit 40f18bf14da5fb50662e1f861ea594a462b207fe)