oss-sec mailing list archives
CVE-2026-41651: TOCTOU vulnerability in PackageKit <= 1.3.4 leads to local root exploit
From: Matthias Klumpp <matthias () tenstral net>
Date: Wed, 22 Apr 2026 17:29:25 +0200
Hello everyone!I am the maintainer of PackageKit, a D-Bus abstraction layer for distribution package management that is commonly used on non-atomic (Linux) desktop distributions, as well as some servers running management software that make use of it.
A vulnerability was reported to the project by Deutsche Telekom’s Red Team that allows the user to install/remove arbitrary packages, leading to a local root exploit on most systems.
Distributors were informed in advance (directly and via distros@), so fixed packages should be available already. Assume all versions of PackageKit <= 1.3.4 that were not patched are vulnerable.
This patch resolves the issue: https://github.com/PackageKit/PackageKit/commit/76cfb675fb31acc3ad5595d4380bfff56d2a8697PackageKit 1.3.5 which resolves this issue was released today as well, with the embargo lift.
For further information on the issue, the security researchers published a blog post:
https://github.security.telekom.com/2026/04/pack2theroot-linux-local-privilege-escalation.htmlA GHSA is also available at: https://github.com/PackageKit/PackageKit/security/advisories/GHSA-f55j-vvr9-69xv
We are currently intentionally light on details, to give users some time to update their systems before this issue is actively exploited. So, expect a detailed vulnerability report soon (the blog post will be updated in that case).
The patch that fixes the issue is already a huge tell though, so please make sure your users receive the update soon (or update yourself), to ensure this is fixed before anyone actively exploits the issue.
With kind regards,
Matthias Klumpp
Current thread:
- CVE-2026-41651: TOCTOU vulnerability in PackageKit <= 1.3.4 leads to local root exploit Matthias Klumpp (Apr 22)
