CVE-2020-16122
Publication date 13 June 2020
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
PackageKit's apt backend mistakenly treated all local debs as trusted. The apt security model is based on repository trust and not on the contents of individual files. On sites with configured PolicyKit rules this may allow users to install malicious packages.
Status
Package | Ubuntu Release | Status |
---|---|---|
packagekit | 20.04 LTS focal |
Fixed 1.1.13-2ubuntu1.1
|
18.04 LTS bionic |
Fixed 1.1.9-1ubuntu2.18.04.6
|
|
16.04 LTS xenial |
Fixed 0.8.17-4ubuntu6~gcc5.4ubuntu1.5
|
|
14.04 LTS trusty | Not in release |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 · High |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4538-1
- PackageKit vulnerabilities
- 24 September 2020