Описание
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 0.4.1-1ubuntu1.18.04.1 |
cosmic | released | 0.4.1-1ubuntu1.18.10.1 |
devel | not-affected | 0.4.9-1 |
disco | released | 0.4.3-1ubuntu1.19.04.1 |
eoan | ignored | end of life |
esm-apps/bionic | released | 0.4.1-1ubuntu1.18.04.1 |
esm-apps/focal | needed | |
esm-apps/jammy | needed | |
esm-apps/noble | not-affected | 0.4.9-1 |
esm-apps/xenial | released | 0.3.8-2ubuntu0.1~esm1 |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg t ...
EPSS
5 Medium
CVSS2
7.5 High
CVSS3