USN-4839-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-4839-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-4839-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4839-1
Related
Published
2021-03-15T22:21:57.669993Z
Modified
2021-03-15T22:21:57.669993Z
Summary
python-gnupg vulnerabilities
Details

Marcus Brinkmann discovered that python-gnupg improperly handled certain command line parameters. A remote attacker could use this to spoof the output of python-gnupg and cause unsigned e-mail to appear signed. (CVE-2018-12020)

It was discovered that python-gnupg incorrectly handled the GPG passphrase. A remote attacker could send a specially crafted passphrase that would allow them to control the output of encryption and decryption operations. (CVE-2019-6690)

References

Affected packages

Ubuntu:Pro:14.04:LTS / python-gnupg

Package

Name
python-gnupg

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.3.6-1ubuntu0.1~esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "python-gnupg": "0.3.6-1ubuntu0.1~esm1",
            "python3-gnupg": "0.3.6-1ubuntu0.1~esm1"
        }
    ]
}

Ubuntu:Pro:16.04:LTS / python-gnupg

Package

Name
python-gnupg

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.3.8-2ubuntu0.1~esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "python-gnupg": "0.3.8-2ubuntu0.1~esm1",
            "python3-gnupg": "0.3.8-2ubuntu0.1~esm1"
        }
    ]
}