CVE-2020-16122

PackageKit's apt backend mistakenly treated all local debs as trusted. The apt security model is based on repository trust and not on the contents of individual files. On sites with configured PolicyKit rules this may allow users to install malicious packages.
References
Link Resource
https://bugs.launchpad.net/ubuntu/+source/packagekit/+bug/1882098 Issue Tracking Third Party Advisory
https://bugs.launchpad.net/ubuntu/+source/packagekit/+bug/1882098 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:packagekit_project:packagekit:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 05:06

Type Values Removed Values Added
CVSS v2 : 2.1
v3 : 7.8
v2 : 2.1
v3 : 8.2
References () https://bugs.launchpad.net/ubuntu/+source/packagekit/+bug/1882098 - Issue Tracking, Third Party Advisory () https://bugs.launchpad.net/ubuntu/+source/packagekit/+bug/1882098 - Issue Tracking, Third Party Advisory

Information

Published : 2020-11-07 04:15

Updated : 2024-11-21 05:06


NVD link : CVE-2020-16122

Mitre link : CVE-2020-16122

CVE.ORG link : CVE-2020-16122


JSON object : View

Products Affected

canonical

  • ubuntu_linux

packagekit_project

  • packagekit
CWE
CWE-269

Improper Privilege Management

CWE-345

Insufficient Verification of Data Authenticity