<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>PackageKit | OKHK 👀</title><description>🤣 不一定客观，不一定理性，个人数字泔水\(⁠◔⁠‿⁠◔⁠)✨ Thinking...</description><link>https://okhk.pages.dev</link><item><title>🔴 PackageKit 本地提权漏洞；请尽快升级至 1.3.5</title><link>https://okhk.pages.dev/posts/9522</link><guid isPermaLink="true">https://okhk.pages.dev/posts/9522</guid><pubDate>Wed, 22 Apr 2026 13:14:23 GMT</pubDate><content:encoded>&lt;i&gt;&lt;b&gt;🔴&lt;/b&gt;&lt;/i&gt; &lt;mark&gt;PackageKit&lt;/mark&gt; 本地提权漏洞；请尽快升级至 1.3.5。&lt;br /&gt;&lt;br /&gt;- 修复版本 1.3.5 在约两小时前发布。&lt;br /&gt;- &lt;mark&gt;PackageKit&lt;/mark&gt; 是许多包管理器的后端，在 Ubuntu、Debian、Fedora 等发行版上被广泛应用；最早受影响版本 1.0.2 版本在 12 年前发布。&lt;br /&gt;- 鉴于以上情况，目前大部分正在运行的 Linux 系统都受此漏洞影响，建议系统管理员在更新版本于发行版发布后及时更新。&lt;br /&gt;&lt;br /&gt;CVSS: 8.8/10&lt;br /&gt;Affect: [1.0.2, 1.3.4]&lt;br /&gt;&lt;br /&gt;- &lt;a href=&quot;https://github.com/PackageKit/PackageKit/security/advisories/GHSA-f55j-vvr9-69xv&quot; target=&quot;_blank&quot;&gt;GHSA-f55j-vvr9-69xv&lt;/a&gt;&lt;br /&gt;- &lt;a href=&quot;https://github.security.telekom.com/2026/04/pack2theroot-linux-local-privilege-escalation.html&quot; target=&quot;_blank&quot;&gt;github.security.telekom.com/~&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;linksrc: &lt;a href=&quot;https://t.me/bupt_moe/2712&quot; target=&quot;_blank&quot;&gt;https://t.me/bupt_moe/2712&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;/search/result?q=%23Security&quot;&gt;#Security&lt;/a&gt; &lt;a href=&quot;/search/result?q=%23PackageKit&quot;&gt;#PackageKit&lt;/a&gt;&lt;a href=&quot;https://github.com/PackageKit/PackageKit/security/advisories/GHSA-f55j-vvr9-69xv&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;GitHub&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Race condition vulnerability leads to arbitrary package installation as root&quot; src=&quot;/static/https://cdn4.telesco.pe/file/q56SYK9L2tfsMSioddBbnU2cHPtaHg7fEXRFlxkE9D22b6pRv-N9mvmRG9c-gbb0ckc50tVZv5vSH4a5gPXbdVmtiFQ-jDv9iAUQPkafoRJ3NcMBjkBkIulTIxleJjWAeTnPemnsLg2kDALh1Z8FCF2bvTznDCAueNhnlegBnJHJU401dU3AKM9tURie2KxQdAtUjlhvaVwW58YWd588-G3ZxWN5Jrvt1SHv4B7zcQrpWRuxItpO4xNRP_7IW2QD5kw1wI662d8xR4jump1a1SkO_fAt8pZ2kUWh0VAOjlJS93wxZWg1I5jr4p3xwH8LrO8N5j6xlKgVk8FB4QGSJg.jpg&quot; width=&quot;1200&quot; height=&quot;630&quot; loading=&quot;eager&quot; /&gt;
  &lt;div&gt;Race condition vulnerability leads to arbitrary package installation as root&lt;/div&gt;
  &lt;div&gt;This report explains a vulnerability within &lt;mark&gt;PackageKit&lt;/mark&gt;, that allows unprivileged user installing packages as root and thus leads to a local privilege escalation. &lt;br /&gt; &lt;br /&gt;All &lt;mark&gt;PackageKit&lt;/mark&gt; versions between ...&lt;/div&gt;
&lt;/a&gt;</content:encoded></item></channel></rss>