CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
5Description
NULL pointer dereference in TagSection.keys() in python-apt on APT-based Linux systems allows a local attacker to cause a denial of service (process crash) via a crafted deb822 file with a malformed non-UTF-8 key.
Analysis
NULL pointer dereference in TagSection.keys() in python-apt on APT-based Linux systems allows a local attacker to cause a denial of service (process crash) via a crafted deb822 file with a malformed non-UTF-8 key.
Technical Context
A NULL pointer dereference occurs when the application attempts to use a pointer that has not been initialized or has been set to NULL.
Affected Products
Affected products: Ubuntu Python-Apt
Remediation
Add NULL checks before pointer dereference operations. Use static analysis to identify potential NULL pointer issues. Enable compiler warnings.
Priority Score
Vendor Status
Ubuntu
Priority: Medium| Release | Status | Version |
|---|---|---|
| upstream | released | 3.1.0 |
| bionic | released | 1.6.6ubuntu0.1~esm1 |
| focal | released | 2.0.1ubuntu0.20.04.1+esm1 |
| jammy | released | 2.4.0ubuntu4.1 |
| noble | released | 2.7.7ubuntu5.1 |
| plucky | released | 3.0.0ubuntu0.25.04.1 |
| questing | released | 3.0.0ubuntu1.1 |
| trusty | released | 0.9.3.5ubuntu3+esm5 |
| xenial | released | 1.1.0~beta1ubuntu0.16.04.12+esm1 |
Debian
Bug #1122291| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye | fixed | 2.2.1.1 | - |
| bullseye (security) | fixed | 2.2.1.1 | - |
| bookworm | vulnerable | 2.6.0 | - |
| trixie | vulnerable | 3.0.0 | - |
| forky, sid | fixed | 3.1.0 | - |
| (unstable) | fixed | 3.1.0 | - |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-201407