CVE-2018-1106

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-1106
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-1106.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-1106
Related
Published
2018-04-23T20:29:14Z
Modified
2025-01-08T04:55:34.070173Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

An authentication bypass flaw has been found in PackageKit before 1.1.10 that allows users without administrator privileges to install signed packages. A local attacker can use this vulnerability to install vulnerable packages to further compromise a system.

References

Affected packages

Debian:11 / packagekit

Package

Name
packagekit
Purl
pkg:deb/debian/packagekit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / packagekit

Package

Name
packagekit
Purl
pkg:deb/debian/packagekit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / packagekit

Package

Name
packagekit
Purl
pkg:deb/debian/packagekit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/hughsie/packagekit

Affected ranges

Type
GIT
Repo
https://github.com/hughsie/packagekit
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

PACKAGEKIT_0_1_0
PACKAGEKIT_0_1_1
PACKAGEKIT_0_1_10
PACKAGEKIT_0_1_11
PACKAGEKIT_0_1_2
PACKAGEKIT_0_1_3
PACKAGEKIT_0_1_4
PACKAGEKIT_0_1_5
PACKAGEKIT_0_1_6
PACKAGEKIT_0_1_7
PACKAGEKIT_0_1_8
PACKAGEKIT_0_1_9
PACKAGEKIT_0_2_0
PACKAGEKIT_0_2_1
PACKAGEKIT_0_2_2
PACKAGEKIT_0_3_0
PACKAGEKIT_0_3_1
PACKAGEKIT_0_3_10
PACKAGEKIT_0_3_11
PACKAGEKIT_0_3_2
PACKAGEKIT_0_3_3
PACKAGEKIT_0_3_4
PACKAGEKIT_0_3_5
PACKAGEKIT_0_3_6
PACKAGEKIT_0_3_7
PACKAGEKIT_0_3_8
PACKAGEKIT_0_3_9
PACKAGEKIT_0_4_0
PACKAGEKIT_0_4_1
PACKAGEKIT_0_4_2
PACKAGEKIT_0_4_3
PACKAGEKIT_0_4_4
PACKAGEKIT_0_4_5
PACKAGEKIT_0_4_6
PACKAGEKIT_0_4_7
PACKAGEKIT_0_4_8
PACKAGEKIT_0_5_0
PACKAGEKIT_0_5_1
PACKAGEKIT_0_5_2
PACKAGEKIT_0_5_3
PACKAGEKIT_0_5_5
PACKAGEKIT_0_6_0
PACKAGEKIT_0_6_1
PACKAGEKIT_0_6_10
PACKAGEKIT_0_6_11
PACKAGEKIT_0_6_12
PACKAGEKIT_0_6_13
PACKAGEKIT_0_6_14
PACKAGEKIT_0_6_15
PACKAGEKIT_0_6_16
PACKAGEKIT_0_6_2
PACKAGEKIT_0_6_3
PACKAGEKIT_0_6_4
PACKAGEKIT_0_6_5
PACKAGEKIT_0_6_6
PACKAGEKIT_0_6_7
PACKAGEKIT_0_6_8
PACKAGEKIT_0_6_9
PACKAGEKIT_0_7_0
PACKAGEKIT_0_7_1
PACKAGEKIT_0_7_2
PACKAGEKIT_0_7_3
PACKAGEKIT_0_7_4
PACKAGEKIT_0_8_1
PACKAGEKIT_0_8_10
PACKAGEKIT_0_8_11
PACKAGEKIT_0_8_12
PACKAGEKIT_0_8_13
PACKAGEKIT_0_8_14
PACKAGEKIT_0_8_2
PACKAGEKIT_0_8_3
PACKAGEKIT_0_8_4
PACKAGEKIT_0_8_5
PACKAGEKIT_0_8_6
PACKAGEKIT_0_8_7
PACKAGEKIT_0_8_8
PACKAGEKIT_0_8_9
PACKAGEKIT_0_9_1
PACKAGEKIT_0_9_2
PACKAGEKIT_0_9_3
PACKAGEKIT_0_9_4
PACKAGEKIT_0_9_5
PACKAGEKIT_1_0_0
PACKAGEKIT_1_0_1
PACKAGEKIT_1_0_10
PACKAGEKIT_1_0_11
PACKAGEKIT_1_0_2
PACKAGEKIT_1_0_3
PACKAGEKIT_1_0_4
PACKAGEKIT_1_0_5
PACKAGEKIT_1_0_6
PACKAGEKIT_1_0_7
PACKAGEKIT_1_0_8
PACKAGEKIT_1_0_9
PACKAGEKIT_1_1_0
PACKAGEKIT_1_1_1
PACKAGEKIT_1_1_2
PACKAGEKIT_1_1_3
PACKAGEKIT_1_1_4
PACKAGEKIT_1_1_5
PACKAGEKIT_1_1_6
PACKAGEKIT_1_1_7
PACKAGEKIT_1_1_8
PACKAGEKIT_1_1_9