Marcus Brinkmann discovered that python-gnupg improperly handled certain
command line parameters. A remote attacker could use this to spoof the
output of python-gnupg and cause unsigned e-mail to appear signed.
(CVE-2018-12020)
It was discovered that python-gnupg incorrectly handled the GPG passphrase.
A remote attacker could send a specially crafted passphrase that would
allow them to control the output of encryption and decryption operations.
(CVE-2019-6690)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.04 | noarch | python3-gnupg | <Â 0.3.8-2ubuntu0.1~esm1 | UNKNOWN |
Ubuntu | 16.04 | noarch | python-gnupg | <Â 0.3.8-2 | UNKNOWN |
Ubuntu | 16.04 | noarch | python3-gnupg | <Â 0.3.8-2 | UNKNOWN |
Ubuntu | 16.04 | noarch | python-gnupg | <Â 0.3.8-2ubuntu0.1~esm1 | UNKNOWN |
Ubuntu | 14.04 | noarch | python3-gnupg | <Â 0.3.6-1ubuntu0.1~esm1 | UNKNOWN |
Ubuntu | 14.04 | noarch | python-gnupg | <Â 0.3.6-1 | UNKNOWN |
Ubuntu | 14.04 | noarch | python3-gnupg | <Â 0.3.6-1 | UNKNOWN |
Ubuntu | 14.04 | noarch | python-gnupg | <Â 0.3.6-1ubuntu0.1~esm1 | UNKNOWN |