CVE-2020-16122

PackageKit's apt backend mistakenly treated all local debs as trusted. The apt security model is based on repository trust and not on the contents of individual files. On sites with configured PolicyKit rules this may allow users to install malicious packages.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.2 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
canonicalCNA
8.2 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 24%
VendorProductVersion
packagekit_projectpackagekit
-
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
20.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
packagekit
bullseye
1.2.2-2
fixed
buster
no-dsa
bookworm
1.2.6-5
fixed
sid
1.3.0-1
fixed
trixie
1.3.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
packagekit
focal
Fixed 1.1.13-2ubuntu1.1
released
bionic
Fixed 1.1.9-1ubuntu2.18.04.6
released
xenial
Fixed 0.8.17-4ubuntu6~gcc5.4ubuntu1.5
released
trusty
dne