python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
History
07 Nov 2023, 03:13
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-03-21 16:01
Updated : 2023-11-07 03:13
NVD link : CVE-2019-6690
Mitre link : CVE-2019-6690
JSON object : View
Products Affected
debian
- debian_linux
python
- python-gnupg
canonical
- ubuntu_linux
opensuse
- leap
suse
- backports
- linux_enterprise
CWE
CWE-20
Improper Input Validation