CVE-2019-15796Improper Authentication in Python-apt

Severity
4.7MEDIUMNVD
EPSS
0.2%
top 61.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 26
Latest updateMay 24

Description

Python-apt doesn't check if hashes are signed in `Version.fetch_binary()` and `Version.fetch_source()` of apt/package.py or in `_fetch_archives()` of apt/cache.py in version 1.9.3ubuntu2 and earlier. This allows downloads from unsigned repositories which shouldn't be allowed and has been fixed in verisions 1.9.5, 1.9.0ubuntu1.2, 1.6.5ubuntu0.1, 1.1.0~beta1ubuntu0.16.04.7, 0.9.3.5ubuntu3+esm2, and 0.8.3ubuntu7.5.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 1.6 | Impact: 2.7

Affected Packages6 packages

CVEListV5canonical/python-apt0.8.30.8.3ubuntu7.5+5
PyPIcanonical/python-apt0.9.00.9.3.5ubuntu3+4
Debiancanonical/python-apt< 1.8.5+3
Ubuntucanonical/python-apt< 1.1.0~beta1ubuntu0.16.04.7+1

Patches

🔴Vulnerability Details

7
OSV
python-apt Does Not Check Hash Signature2022-05-24
GHSA
python-apt Does Not Check Hash Signature2022-05-24
OSV
CVE-2019-15796: Python-apt doesn't check if hashes are signed in `Version2020-03-26
CVEList
python-apt downloads from untrusted sources2020-03-26
OSV
python-apt vulnerabilities2020-01-23

📋Vendor Advisories

3
Ubuntu
python-apt vulnerabilities2020-01-23
Ubuntu
python-apt vulnerabilities2020-01-22
Debian
CVE-2019-15796: python-apt - Python-apt doesn't check if hashes are signed in `Version.fetch_binary()` and `V...2019
CVE-2019-15796 — Improper Authentication in Python-apt | cvebase