GHSA-qh62-ch95-63wh

Suggest an improvement
Source
https://github.com/advisories/GHSA-qh62-ch95-63wh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/03/GHSA-qh62-ch95-63wh/GHSA-qh62-ch95-63wh.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-qh62-ch95-63wh
Aliases
Withdrawn
2020-06-16T20:25:44Z
Published
2020-03-13T20:05:10Z
Modified
2024-12-05T05:40:19.492378Z
Summary
Duplicate Advisory: python-gnupg allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended
Details

Withdrawn: Duplicate of GHSA-2fch-jvg5-crf6

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2020-03-13T20:04:45Z"
}
References

Affected packages

PyPI / python-gnupg

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.4

Affected versions

0.*

0.2.3
0.2.4
0.2.6
0.2.7
0.2.8
0.2.9
0.3.0
0.3.1
0.3.2
0.3.3
0.3.4
0.3.5
0.3.6
0.3.7
0.3.8
0.3.9
0.4.0
0.4.1
0.4.2
0.4.3