Revision Date: | 2018-04-23 | Version: | 1 | Title: | CVE-2018-1106 on Ubuntu 16.04 LTS (xenial) - high. | Description: | An authentication bypass flaw has been found in PackageKit before 1.1.10 that allows users without administrator privileges to install signed packages. A local attacker can use this vulnerability to install vulnerable packages to further compromise a system.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2018-1106
| Platform(s): | Ubuntu 16.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 16.04 LTS (xenial) is installed. AND Package Information
NOT gir1.2-packagekitglib-1.0 package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT gstreamer1.0-packagekit package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT libpackagekit-glib2-16 package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT packagekit package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT packagekit-backend-aptcc package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT packagekit-backend-smart package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT packagekit-gtk3-module package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT packagekit-tools package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT python3-packagekit package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
|
|