|
|
Message-ID: <c0a06c34-828f-4635-9265-d700c8b2b52a@tenstral.net>
Date: Wed, 22 Apr 2026 17:29:25 +0200
From: Matthias Klumpp <matthias@...stral.net>
To: oss-security@...ts.openwall.com
Subject: CVE-2026-41651: TOCTOU vulnerability in PackageKit <= 1.3.4 leads to
local root exploit
Hello everyone!
I am the maintainer of PackageKit, a D-Bus abstraction layer for
distribution package management that is commonly used on non-atomic
(Linux) desktop distributions, as well as some servers running
management software that make use of it.
A vulnerability was reported to the project by Deutsche Telekom’s Red
Team that allows the user to install/remove arbitrary packages, leading
to a local root exploit on most systems.
Distributors were informed in advance (directly and via distros@), so
fixed packages should be available already. Assume all versions of
PackageKit <= 1.3.4 that were not patched are vulnerable.
This patch resolves the issue:
https://github.com/PackageKit/PackageKit/commit/76cfb675fb31acc3ad5595d4380bfff56d2a8697
PackageKit 1.3.5 which resolves this issue was released today as well,
with the embargo lift.
For further information on the issue, the security researchers published
a blog post:
https://github.security.telekom.com/2026/04/pack2theroot-linux-local-privilege-escalation.html
A GHSA is also available at:
https://github.com/PackageKit/PackageKit/security/advisories/GHSA-f55j-vvr9-69xv
We are currently intentionally light on details, to give users some time
to update their systems before this issue is actively exploited. So,
expect a detailed vulnerability report soon (the blog post will be
updated in that case).
The patch that fixes the issue is already a huge tell though, so please
make sure your users receive the update soon (or update yourself), to
ensure this is fixed before anyone actively exploits the issue.
With kind regards,
Matthias Klumpp
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.