CVE-2019-6690
Summary
| CVE | CVE-2019-6690 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-03-21 16:01:00 UTC |
| Updated | 2023-11-07 03:13:00 UTC |
| Description | python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] Fedora 32 Update: python-gnupg-0.4.6-1.fc32 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| [SECURITY] Fedora 31 Update: python-gnupg-0.4.6-1.fc31 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| [SECURITY] Fedora 30 Update: python-gnupg-0.4.4-1.fc30 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| Bugtraq: CVE-2019-6690: Improper Input Validation in python-gnupg |
BUGTRAQ |
seclists.org |
Exploit, Issue Tracking, Mailing List, Third Party Advisory |
| [security-announce] openSUSE-SU-2019:0143-1: important: Security update |
SUSE |
lists.opensuse.org |
Third Party Advisory |
| CVE-2019-6690: Improper Input Validation in python-gnupg – Hackeriet |
MISC |
blog.hackeriet.no |
Third Party Advisory |
| python-gnupg · PyPI |
MISC |
pypi.org |
Product |
| [SECURITY] Fedora 30 Update: python-gnupg-0.4.4-1.fc30 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| Python GnuPG 0.4.3 Improper Input Validation ≈ Packet Storm |
MISC |
packetstormsecurity.com |
Third Party Advisory, VDB Entry |
| [security-announce] openSUSE-SU-2019:0239-1: important: Security update |
SUSE |
lists.opensuse.org |
Third Party Advisory |
| [SECURITY] Fedora 32 Update: python-gnupg-0.4.6-1.fc32 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| Malformed Request |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| [SECURITY] [DLA 1675-1] python-gnupg security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| [SECURITY] [DLA 2862-1] python-gnupg security update |
MLIST |
lists.debian.org |
|
| [SECURITY] Fedora 31 Update: python-gnupg-0.4.6-1.fc31 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| USN-3964-1: python-gnupg vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 178969 Debian Security Update for python-gnupg (DLA 2862-1)
- 981444 Python (pip) Security Update for python-gnupg (GHSA-2fch-jvg5-crf6)
- 983462 Python (pip) Security Update for python-gnupg (GHSA-qh62-ch95-63wh)