Description
Missing input validation in the ar/tar implementations of APT before version 2.1.2 could result in denial of service when processing specially crafted deb files.
References (8)
Core 8
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/Debian/apt/issues/111
Issue Tracking, Third Party Advisory x_refsource_misc
https://bugs.launchpad.net/bugs/1878177
Patch, Vendor Advisory x_refsource_misc
https://salsa.debian.org/apt-team/apt/-/commit/dceb1e49e4b8e4dadaf056be34088b415939cda6
Mailing List, Vendor Advisory x_refsource_misc
https://lists.debian.org/debian-security-announce/2020/msg00089.html
Release Notes, Vendor Advisory x_refsource_misc
https://tracker.debian.org/news/1144109/accepted-apt-212-source-into-unstable/
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/4359-1/
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/4359-2/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U4PEH357MZM2SUGKETMEHMSGQS652QHH/
Scores
CVSS v3
5.5
EPSS
0.0040
EPSS Percentile
60.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
CWE-20
Status
published
Products (10)
canonical/ubuntu_linux
12.04
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
19.10
canonical/ubuntu_linux
20.04
debian/apt
< 2.1.2
debian/debian_linux
9.0
debian/debian_linux
10.0
fedoraproject/fedora
32
Published
May 15, 2020
Tracked Since
Feb 18, 2026