CVE-2019-15796
Published: 20 January 2020
Python-apt doesn't check if hashes are signed in `Version.fetch_binary()` and `Version.fetch_source()` of apt/package.py or in `_fetch_archives()` of apt/cache.py in version 1.9.3ubuntu2 and earlier. This allows downloads from unsigned repositories which shouldn't be allowed and has been fixed in verisions 1.9.5, 1.9.0ubuntu1.2, 1.6.5ubuntu0.1, 1.1.0~beta1ubuntu0.16.04.7, 0.9.3.5ubuntu3+esm2, and 0.8.3ubuntu7.5.
Notes
| Author | Note |
|---|---|
| mdeslaur | this requires a fix in aptdaemon also |
Priority
Status
| Package | Release | Status |
|---|---|---|
|
python-apt Launchpad, Ubuntu, Debian |
bionic |
Released
(1.6.5ubuntu0.1)
|
| disco |
Released
(1.8.5~ubuntu0.2)
|
|
| eoan |
Released
(1.9.0ubuntu1.2)
|
|
| trusty |
Released
(0.9.3.5ubuntu3+esm2)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
| upstream |
Needs triage
|
|
| xenial |
Released
(1.1.0~beta1ubuntu0.16.04.7)
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 4.7 |
| Attack vector | Network |
| Attack complexity | High |
| Privileges required | None |
| User interaction | Required |
| Scope | Changed |
| Confidentiality | Low |
| Integrity impact | Low |
| Availability impact | None |
| Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N |