Use of a Broken or Risky Cryptographic Algorithm Affecting python-apt package, versions <1.6.5ubuntu0.1


Severity

Recommended
0.0
medium
0
10

Based on Ubuntu security rating.

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.06% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use of a Broken or Risky Cryptographic Algorithm vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UBUNTU1804-PYTHONAPT-542771
  • published20 Jan 2020
  • disclosed26 Mar 2020

Introduced: 20 Jan 2020

CVE-2019-15795  (opens in a new tab)
CWE-327  (opens in a new tab)

How to fix?

Upgrade Ubuntu:18.04 python-apt to version 1.6.5ubuntu0.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-apt package and not the python-apt package as distributed by Ubuntu. See How to fix? for Ubuntu:18.04 relevant fixed versions and status.

python-apt only checks the MD5 sums of downloaded files in Version.fetch_binary() and Version.fetch_source() of apt/package.py in version 1.9.0ubuntu1 and earlier. This allows a man-in-the-middle attack which could potentially be used to install altered packages and has been fixed in versions 1.9.0ubuntu1.2, 1.6.5ubuntu0.1, 1.1.0~beta1ubuntu0.16.04.7, 0.9.3.5ubuntu3+esm2, and 0.8.3ubuntu7.5.

CVSS Scores

version 3.1