Use of a Broken or Risky Cryptographic Algorithm Affecting python-apt package, versions <0.9.3.5ubuntu3+esm2


Severity

Recommended
0.0
medium
0
10

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.06% (27th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use of a Broken or Risky Cryptographic Algorithm vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UBUNTU1404-PYTHONAPT-542768
  • published20 Jan 2020
  • disclosed26 Mar 2020

Introduced: 20 Jan 2020

CVE-2019-15795  (opens in a new tab)
CWE-327  (opens in a new tab)

How to fix?

Upgrade Ubuntu:14.04 python-apt to version 0.9.3.5ubuntu3+esm2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-apt package and not the python-apt package as distributed by Ubuntu. See How to fix? for Ubuntu:14.04 relevant fixed versions and status.

python-apt only checks the MD5 sums of downloaded files in Version.fetch_binary() and Version.fetch_source() of apt/package.py in version 1.9.0ubuntu1 and earlier. This allows a man-in-the-middle attack which could potentially be used to install altered packages and has been fixed in versions 1.9.0ubuntu1.2, 1.6.5ubuntu0.1, 1.1.0~beta1ubuntu0.16.04.7, 0.9.3.5ubuntu3+esm2, and 0.8.3ubuntu7.5.

CVSS Scores

version 3.1