First published: Sun Mar 17 2019(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/python-gnupg | <0.4.4 | 0.4.4 |
debian/python-gnupg | 0.4.6-1 0.4.9-1 0.5.4-1 | |
Kali Python 3 Packaging | =0.4.3 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
SUSE Linux | =15.0 | |
All of | ||
openSUSE Backports | ||
SUSE Linux Enterprise Server | =15.0 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Ubuntu | =19.04 | |
openSUSE Backports | ||
SUSE Linux Enterprise Server | =15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-6690 is high with a CVSS score of 7.5.
The affected software version of CVE-2019-6690 is python-gnupg 0.4.3.
An attacker can exploit CVE-2019-6690 by tricking gnupg to decrypt other ciphertext than intended.
The remedy for CVE-2019-6690 is to upgrade to python-gnupg version 0.4.4 or higher.
CWE-20 is a category of weaknesses related to improper input validation.