First published: Wed Dec 09 2020(Updated: )
Last updated 24 July 2024
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/aptdaemon | ||
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =20.04 | |
Ubuntu Linux | =20.10 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
Ubuntu | =20.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-16128 has been classified as a moderate severity vulnerability due to potential file existence disclosure.
To fix CVE-2020-16128, update the aptdaemon package to versions 1.1.1+bzr982-0ubuntu34.1 or higher.
CVE-2020-16128 affects Ubuntu Linux versions 16.04, 18.04, 20.04, and 20.10 with specific aptdaemon versions.
CVE-2020-16128 may allow attackers to determine the existence of certain files, potentially exposing sensitive information.
CVE-2020-16128 is considered a local vulnerability as it requires local access to the system to exploit.