Marcus Brinkmann discovered that GnuPG before 2.2.8 improperly handled certain command line parameters. A remote attacker could use this to spoof the output of GnuPG and cause unsigned e-mail to appear signed. (CVE-2018-12020)
It was discovered that python-gnupg incorrectly handled the GPG passphrase. A remote attacker could send a specially crafted passphrase that would allow them to control the output of encryption and decryption operations. (CVE-2019-6690)
{
"binaries": [
{
"binary_version": "0.4.1-1ubuntu1.18.04.1",
"binary_name": "python-gnupg"
},
{
"binary_version": "0.4.1-1ubuntu1.18.04.1",
"binary_name": "python3-gnupg"
}
],
"availability": "No subscription required"
}
{
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2018-12020"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2019-6690"
}
],
"ecosystem": "Ubuntu:18.04:LTS"
}