CVE-2020-16122
Published: 13 June 2020
PackageKit's apt backend mistakenly treated all local debs as trusted. The apt security model is based on repository trust and not on the contents of individual files. On sites with configured PolicyKit rules this may allow users to install malicious packages.
Priority
Status
Package | Release | Status |
---|---|---|
packagekit Launchpad, Ubuntu, Debian |
bionic |
Released
(1.1.9-1ubuntu2.18.04.6)
|
focal |
Released
(1.1.13-2ubuntu1.1)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Released
(0.8.17-4ubuntu6~gcc5.4ubuntu1.5)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |