First published: Thu Mar 21 2019(Updated: )
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/python-gnupg | <0.4.4 | 0.4.4 |
Python Python-gnupg | =0.4.3 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.0 | |
Suse Backports | ||
SUSE Linux Enterprise | =15.0 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Canonical Ubuntu Linux | =19.04 | |
ubuntu/python-gnupg | <0.3.6-1ubuntu0.1~ | 0.3.6-1ubuntu0.1~ |
ubuntu/python-gnupg | <0.3.8-2ubuntu0.1~ | 0.3.8-2ubuntu0.1~ |
ubuntu/python-gnupg | <0.4.1-1ubuntu1.18.04.1 | 0.4.1-1ubuntu1.18.04.1 |
ubuntu/python-gnupg | <0.4.1-1ubuntu1.18.10.1 | 0.4.1-1ubuntu1.18.10.1 |
ubuntu/python-gnupg | <0.4.3-1ubuntu1.19.04.1 | 0.4.3-1ubuntu1.19.04.1 |
ubuntu/python-gnupg | <0.4.4-1 | 0.4.4-1 |
All of | ||
Suse Backports | ||
SUSE Linux Enterprise | =15.0 | |
debian/python-gnupg | 0.4.4-1 0.4.6-1 0.4.9-1 0.5.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-6690 is high with a CVSS score of 7.5.
The affected software version of CVE-2019-6690 is python-gnupg 0.4.3.
An attacker can exploit CVE-2019-6690 by tricking gnupg to decrypt other ciphertext than intended.
The remedy for CVE-2019-6690 is to upgrade to python-gnupg version 0.4.4 or higher.
CWE-20 is a category of weaknesses related to improper input validation.