Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4408-1 | python-apt security update |
Ubuntu USN |
USN-7916-1 | python-apt vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 07 Jan 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical ubuntu Linux
Debian Debian debian Linux Ubuntu Ubuntu python-apt |
|
| CPEs | cpe:2.3:a:ubuntu:python-apt:*:*:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:0.9.3.11:-:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:0.9.3.11:build1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:0.9.3.5:ubuntu1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:0.9.3.5:ubuntu2:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1build1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.10:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.11:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.2:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.3:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.4:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.5:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.7:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.8:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.9:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta2ubuntu1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta3:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta4:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta4ubuntu1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta5:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta5ubuntu1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.6.6:-:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.0.1:-:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.4.0:-:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.4.0:\+22.10:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.4.0:ubuntu1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.4.0:ubuntu2:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.4.0:ubuntu3:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.4.0:ubuntu4:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.7.7:-:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.7.7:build1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.7.7:ubuntu1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.7.7:ubuntu2:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.7.7:ubuntu3:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.7.7:ubuntu4:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.7.7:ubuntu5:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:3.0.0:-:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:3.0.0:ubuntu1:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Canonical ubuntu Linux
Debian Debian debian Linux Ubuntu Ubuntu python-apt |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 17 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 15 Dec 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 09 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical python-apt |
|
| Vendors & Products |
Canonical
Canonical python-apt |
Mon, 08 Dec 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NULL pointer dereference in TagSection.keys() in python-apt on APT-based Linux systems allows a local attacker to cause a denial of service (process crash) via a crafted deb822 file with a malformed non-UTF-8 key. | NULL pointer dereference in TagSection.keys() in python-apt on APT-based Linux systems allows a local attacker to cause a denial of service (process crash) via a crafted deb822 file with a malformed non-UTF-8 key. |
Fri, 05 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 05 Dec 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NULL pointer dereference in TagSection.keys() in python-apt on APT-based Linux systems allows a local attacker to cause a denial of service (process crash) via a crafted deb822 file with a malformed non-UTF-8 key. | |
| Title | Null-pointer dereference in python-apt TagSection.keys() | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2025-12-15T22:04:15.781Z
Reserved: 2025-07-01T09:59:55.552Z
Link: CVE-2025-6966
Updated: 2025-12-15T22:04:15.781Z
Status : Analyzed
Published: 2025-12-05T13:16:05.220
Modified: 2026-01-07T22:20:56.370
Link: CVE-2025-6966
OpenCVE Enrichment
Updated: 2025-12-09T10:05:56Z
Debian DLA
Ubuntu USN