{"id":14091,"date":"2026-04-25T09:22:06","date_gmt":"2026-04-25T13:22:06","guid":{"rendered":"https:\/\/www.both.org\/?p=14091"},"modified":"2026-04-25T09:36:50","modified_gmt":"2026-04-25T13:36:50","slug":"high-severity-vulnerability-in-packagekit","status":"publish","type":"post","link":"https:\/\/www.both.org\/?p=14091","title":{"rendered":"High-severity Vulnerability in PackageKit"},"content":{"rendered":"<div class=\"pld-like-dislike-wrap pld-template-1\">\r\n    <div class=\"pld-like-wrap  pld-common-wrap\">\r\n    <a href=\"javascript:void(0)\" class=\"pld-like-trigger pld-like-dislike-trigger  \" title=\"\" data-post-id=\"14091\" data-trigger-type=\"like\" data-restriction=\"cookie\" data-already-liked=\"0\">\r\n                        <i class=\"fas fa-thumbs-up\"><\/i>\r\n                <\/a>\r\n    <span class=\"pld-like-count-wrap pld-count-wrap\">    <\/span>\r\n<\/div><\/div>\n<p>PackageKit is a D-Bus abstraction layer that allows the session user to manage packages in a secure way using a cross-distro, cross-architecture API. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The vulnerability<\/h2>\n\n\n\n<p>All  versions of PackageKit between >= 1.0.2 and &lt;= 1.3.4, from November 2014 though now, contain a local privilege escalation vulnerability identified as <a href=\"https:\/\/github.security.telekom.com\/2026\/04\/pack2theroot-linux-local-privilege-escalation.html\" data-type=\"link\" data-id=\"https:\/\/github.security.telekom.com\/2026\/04\/pack2theroot-linux-local-privilege-escalation.html\" target=\"_blank\" rel=\"noreferrer noopener\">Pack2TheRoot (CVE-2026-41651): Cross-Distro Local Privilege Escalation Vulnerability<\/a>. This vulnerability was recently identified by Deutsche Telekom Security as part of their research into local privilege escalation attack vectors. <\/p>\n\n\n\n<p>This vulnerability allows a local, non-privileged user to escalate their privilege in order to install or remove packages in order to damage the system or to further compromise it.<\/p>\n\n\n\n<p>The details of exploiting this vulnerability have not been released in the interest of security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The fix<\/h2>\n\n\n\n<p>Updating to PackageKit 1.3.5 closes the vulnerability. The patched version of the software is available, but not all distros have yet made it available. <\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A local, privilege escalation vulnerability exists in all versions of PackageKit from 1.02 through and including 1.3.4.<\/p>\n","protected":false},"author":2,"featured_media":14098,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[5,39,75,781],"tags":[972,971,261],"class_list":["post-14091","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux","category-news","category-security","category-vulnerability","tag-cve-2026-41651","tag-packagekit","tag-security"],"modified_by":"David Both","_links":{"self":[{"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/posts\/14091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.both.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14091"}],"version-history":[{"count":4,"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/posts\/14091\/revisions"}],"predecessor-version":[{"id":14096,"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/posts\/14091\/revisions\/14096"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/media\/14098"}],"wp:attachment":[{"href":"https:\/\/www.both.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.both.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.both.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}