Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4408-1 | python-apt security update |
Ubuntu USN |
USN-7916-1 | python-apt vulnerability |
Ubuntu USN |
USN-7916-2 | python-apt regression |
Wed, 07 Jan 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical ubuntu Linux
Debian Debian debian Linux Ubuntu Ubuntu python-apt |
|
| CPEs | cpe:2.3:a:ubuntu:python-apt:*:*:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:0.9.3.11:-:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:0.9.3.11:build1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:0.9.3.5:ubuntu1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:0.9.3.5:ubuntu2:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1build1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.10:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.11:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.2:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.3:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.4:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.5:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.7:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.8:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta1ubuntu0.16.04.9:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta2ubuntu1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta3:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta4:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta4ubuntu1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta5:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.1.0:beta5ubuntu1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:1.6.6:-:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.0.1:-:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.4.0:-:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.4.0:\+22.10:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.4.0:ubuntu1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.4.0:ubuntu2:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.4.0:ubuntu3:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.4.0:ubuntu4:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.7.7:-:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.7.7:build1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.7.7:ubuntu1:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.7.7:ubuntu2:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.7.7:ubuntu3:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.7.7:ubuntu4:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:2.7.7:ubuntu5:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:3.0.0:-:*:*:*:*:*:* cpe:2.3:a:ubuntu:python-apt:3.0.0:ubuntu1:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Canonical ubuntu Linux
Debian Debian debian Linux Ubuntu Ubuntu python-apt |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 17 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 15 Dec 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 09 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical python-apt |
|
| Vendors & Products |
Canonical
Canonical python-apt |
Mon, 08 Dec 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NULL pointer dereference in TagSection.keys() in python-apt on APT-based Linux systems allows a local attacker to cause a denial of service (process crash) via a crafted deb822 file with a malformed non-UTF-8 key. | NULL pointer dereference in TagSection.keys() in python-apt on APT-based Linux systems allows a local attacker to cause a denial of service (process crash) via a crafted deb822 file with a malformed non-UTF-8 key. |
Fri, 05 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 05 Dec 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NULL pointer dereference in TagSection.keys() in python-apt on APT-based Linux systems allows a local attacker to cause a denial of service (process crash) via a crafted deb822 file with a malformed non-UTF-8 key. | |
| Title | Null-pointer dereference in python-apt TagSection.keys() | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2025-12-15T22:04:15.781Z
Reserved: 2025-07-01T09:59:55.552Z
Link: CVE-2025-6966
Updated: 2025-12-15T22:04:15.781Z
Status : Analyzed
Published: 2025-12-05T13:16:05.220
Modified: 2026-01-07T22:20:56.370
Link: CVE-2025-6966
OpenCVE Enrichment
Updated: 2025-12-09T10:05:56Z
Debian DLA
Ubuntu USN