python-apt only checks the MD5 sums of downloaded files in `Version.fetch_binary()` and `Version.fetch_source()` of apt/package.py in version 1.9.0ubuntu1 and earlier. This allows a man-in-the-middle attack which could potentially be used to install altered packages and has been fixed in versions 1.9.0ubuntu1.2, 1.6.5ubuntu0.1, 1.1.0~beta1ubuntu0.16.04.7, 0.9.3.5ubuntu3+esm2, and 0.8.3ubuntu7.5.
References
Link | Resource |
---|---|
https://usn.ubuntu.com/4247-1/ | Patch Vendor Advisory |
https://usn.ubuntu.com/4247-3/ | Patch Vendor Advisory |
https://usn.ubuntu.com/4247-1/ | Patch Vendor Advisory |
https://usn.ubuntu.com/4247-3/ | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
21 Nov 2024, 04:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://usn.ubuntu.com/4247-1/ - Patch, Vendor Advisory | |
References | () https://usn.ubuntu.com/4247-3/ - Patch, Vendor Advisory |
Information
Published : 2020-03-26 13:15
Updated : 2024-11-21 04:29
NVD link : CVE-2019-15795
Mitre link : CVE-2019-15795
CVE.ORG link : CVE-2019-15795
JSON object : View
Products Affected
canonical
- ubuntu_linux
debian
- python-apt
ubuntu
- python-apt
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm