CVE-2020-16122

EUVD-2020-8088
PackageKit's apt backend mistakenly treated all local debs as trusted. The apt security model is based on repository trust and not on the contents of individual files. On sites with configured PolicyKit rules this may allow users to install malicious packages.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.2 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
canonicalCNA
8.2 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 23%
Affected Products (NVD)
VendorProductVersion
packagekit_projectpackagekit
-
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
20.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
packagekit
bookworm
1.2.6-5
fixed
bullseye
1.2.2-2
fixed
buster
no-dsa
sid
1.3.0-1
fixed
trixie
1.3.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
packagekit
bionic
Fixed 1.1.9-1ubuntu2.18.04.6
released
focal
Fixed 1.1.13-2ubuntu1.1
released
trusty
dne
xenial
Fixed 0.8.17-4ubuntu6~gcc5.4ubuntu1.5
released