HIGH 2026-04-15

CVE-2026-41651 – Pack2TheRoot: Privilege Escalation in PackageKit

A 12-year-old vulnerability in the PackageKit daemon allows the installation of malicious packages with root privileges. Attackers can exploit a race condition to bypass package management security validation.

What happened?

The "Pack2TheRoot" vulnerability (CVE-2026-41651) is located in the PackageKit system service, which handles software installation on many Linux desktops and workstations. It is a classic TOCTOU (Time-of-Check Time-of-Use) race condition.

A local user can initiate a software installation transaction and, through precise timing, alter the transaction flags after the system has verified permissions but before the installation is executed. This allows the deployment of malicious packages or scripts with full system privileges.

Who is affected?

  • Workstations: Employee laptops running Fedora, Debian, Ubuntu, or openSUSE using graphical software centers.
  • Development Environments: Systems where software packages are frequently updated or installed.
  • Legacy Systems: Since the flaw dates back 12 years, older "forgotten" maintenance systems in SME networks are also highly vulnerable.

What needs to be done?

  • 1.Update PackageKit: Ensure that packagekit is updated to version 1.3.5 or higher.
  • 2.Workaround (if no patch available): Temporarily disable the service using the command: systemctl mask packagekit. This prevents the daemon from being triggered.
  • 3.Endpoint Security: Monitor system logs (/var/log/auth.log or journalctl) for unauthorized package installation attempts.
  • 4.Principle of Least Privilege: Verify whether users on workstations actually require local account access to PackageKit interfaces.

This advisory is for informational purposes. For a detailed analysis of your Linux hardening strategy, please contact us.