CVE-2020-16122

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-16122
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-16122.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-16122
Related
Published
2020-11-07T04:15:12Z
Modified
2024-11-21T05:06:48Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

PackageKit's apt backend mistakenly treated all local debs as trusted. The apt security model is based on repository trust and not on the contents of individual files. On sites with configured PolicyKit rules this may allow users to install malicious packages.

References

Affected packages

Debian:11 / packagekit

Package

Name
packagekit
Purl
pkg:deb/debian/packagekit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / packagekit

Package

Name
packagekit
Purl
pkg:deb/debian/packagekit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / packagekit

Package

Name
packagekit
Purl
pkg:deb/debian/packagekit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}