First published: Wed Dec 09 2020(Updated: )
Kevin Backhouse discovered that APT incorrectly handled certain packages. A local attacker could possibly use this issue to cause APT to crash or stop responding, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/apt | <2.1.10ubuntu0.1 | 2.1.10ubuntu0.1 |
Ubuntu Ubuntu | =20.10 | |
All of | ||
ubuntu/apt | <2.0.2ubuntu0.2 | 2.0.2ubuntu0.2 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/apt | <1.6.12ubuntu0.2 | 1.6.12ubuntu0.2 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/apt | <1.2.32ubuntu0.2 | 1.2.32ubuntu0.2 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-4667-1 refers to a vulnerability discovered in APT, a package management tool used in Ubuntu.
The APT vulnerability in USN-4667-1 can be exploited by a local attacker to cause APT to crash or stop responding, resulting in a denial of service.
The APT vulnerability in USN-4667-1 affects Ubuntu 20.10, 20.04, 18.04, and 16.04.
To fix the APT vulnerability in USN-4667-1 on Ubuntu 20.10, you need to update the 'apt' package to version 2.1.10ubuntu0.1 or later.
You can find more information about the APT vulnerability in USN-4667-1 on the Ubuntu Security Notices page: https://ubuntu.com/security/notices/USN-4667-2