Bug 50737 - python-apt: Multiple issues (4.3)
Summary: python-apt: Multiple issues (4.3)
Status: CLOSED FIXED
Alias: None
Product: UCS
Classification: Unclassified
Component: Security updates
Version: UCS 4.3
Hardware: All Linux
: P5 normal
Target Milestone: UCS 4.3-5-errata
Assignee: Quality Assurance
QA Contact: Philipp Hahn
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2020-01-24 08:27 CET by Quality Assurance
Modified: 2020-01-29 14:15 CET (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Customer ID:
Max CVSS v3 score: 0.0 () Debian


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2020-01-24 08:27:30 CET
New Debian python-apt 1.4.1 fixes:
This update addresses the following issues:
* python-apt (CVE-2019-15795)
* python-apt (CVE-2019-15796)
Comment 1 Quality Assurance univentionstaff 2020-01-24 09:00:13 CET
--- mirror/ftp/4.3/unmaintained/4.3-0/source/python-apt_1.4.0~beta3.dsc
+++ apt/ucs_4.3-0-errata4.3-5/source/python-apt_1.4.1.dsc
@@ -1,3 +1,26 @@
+1.4.1 [Thu, 23 Jan 2020 11:32:18 +0100] Julian Andres Klode <jak@debian.org>:
+
+  * SECURITY UPDATE: Check that repository is trusted before downloading
+    files from it (LP: #1858973)
+    - apt/cache.py: Add checks to fetch_archives() and commit()
+    - apt/package.py: Add checks to fetch_binary() and fetch_source()
+    - CVE-2019-15796
+  * SECURITY UPDATE: Do not use MD5 for verifying downloadeds
+    (Closes: #944696) (#LP: #1858972)
+    - apt/package.py: Use all hashes when fetching packages, and
+      check that we have trusted hashes when downloading
+    - CVE-2019-15795
+  * To work around the new checks, the parameter allow_unauthenticated=True
+    can be passed to the functions. It defaults to the value of the
+    APT::Get::AllowUnauthenticated option.
+  * Cherry-pick "add pkgsrcrecord.Files.{hashes,size,path,type} getters" to
+    enable apt_pkg.SourceRecords to return objects with such getters instead
+    of just tuples (providing tuple-style backward compatibility).
+  * Automatic changes and fixes for external regressions:
+    - Adjustments to test suite and CI to fix CI regressions
+    - testcommon: Avoid reading host apt.conf files
+    - Automatic mirror list update
+
 1.4.0~beta3 [Sun, 23 Apr 2017 21:02:14 +0200] Julian Andres Klode <jak@debian.org>:
 
   * apt.auth: Fix check of fingerprint length

<http://10.200.17.11/4.3-5/#8532639862373476742>
Comment 2 Philipp Hahn univentionstaff 2020-01-24 10:52:25 CET
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.3-5] d1bac83d75 Bug #50737: python-apt 1.4.1
 doc/errata/staging/python-apt.yaml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

[4.3-5] f16b08da1b Bug #50737: python-apt 1.4.1
 doc/errata/staging/python-apt.yaml | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

[4.3-5] 1269dabd72 Bug #50737: python-apt 1.4.1
 doc/errata/staging/python-apt.yaml | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
Comment 3 Erik Damrose univentionstaff 2020-01-29 14:15:29 CET
<http://errata.software-univention.de/ucs/4.3/633.html>