CVE-2020-16122

PackageKit's apt backend mistakenly treated all local debs as trusted. The apt security model is based on repository trust and not on the contents of individual files. On sites with configured PolicyKit rules this may allow users to install malicious packages.
References
Link Resource
https://bugs.launchpad.net/ubuntu/+source/packagekit/+bug/1882098 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:packagekit_project:packagekit:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

History

21 Oct 2022, 18:12

Type Values Removed Values Added
CWE CWE-269
NVD-CWE-noinfo
CWE-345

14 Apr 2021, 20:55

Type Values Removed Values Added
CPE cpe:2.3:a:freedesktop:packagekit:-:*:*:*:*:*:*:* cpe:2.3:a:packagekit_project:packagekit:-:*:*:*:*:*:*:*

Information

Published : 2020-11-07 04:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-16122

Mitre link : CVE-2020-16122

CVE.ORG link : CVE-2020-16122


JSON object : View

Products Affected

canonical

  • ubuntu_linux

packagekit_project

  • packagekit
CWE
CWE-345

Insufficient Verification of Data Authenticity

CWE-269

Improper Privilege Management