First published: Wed Jan 22 2020(Updated: )
It was discovered that python-apt would still use MD5 hashes to validate certain downloaded packages. If a remote attacker were able to perform a machine-in-the-middle attack, this flaw could potentially be used to install altered packages. (CVE-2019-15795) It was discovered that python-apt could install packages from untrusted repositories, contrary to expectations. (CVE-2019-15796)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python-apt | <1.9.0ubuntu1.2 | 1.9.0ubuntu1.2 |
Ubuntu Linux | =19.10 | |
All of | ||
ubuntu/python3-apt | <1.9.0ubuntu1.2 | 1.9.0ubuntu1.2 |
Ubuntu Linux | =19.10 | |
All of | ||
ubuntu/python-apt | <1.8.5~ubuntu0.2 | 1.8.5~ubuntu0.2 |
Ubuntu Linux | =19.04 | |
All of | ||
ubuntu/python3-apt | <1.8.5~ubuntu0.2 | 1.8.5~ubuntu0.2 |
Ubuntu Linux | =19.04 | |
All of | ||
ubuntu/python-apt | <1.6.5ubuntu0.1 | 1.6.5ubuntu0.1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/python3-apt | <1.6.5ubuntu0.1 | 1.6.5ubuntu0.1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/python-apt | <1.1.0~beta1ubuntu0.16.04.7 | 1.1.0~beta1ubuntu0.16.04.7 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/python3-apt | <1.1.0~beta1ubuntu0.16.04.7 | 1.1.0~beta1ubuntu0.16.04.7 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4247-1 is considered important as it allows for potential remote package alteration.
To fix USN-4247-1, upgrade the python-apt or python3-apt package to the versions specified in the notice.
USN-4247-1 affects python-apt versions prior to 1.9.0ubuntu1.2 on specific Ubuntu releases.
CVE-2019-15795 is the identifier for the vulnerability that allows attackers to alter package installations.
If you cannot upgrade python-apt, consider implementing network measures to mitigate the risk of man-in-the-middle attacks.