SUSE released an update for PackageKit that fixes CVE-2026-41651. The vulnerability is a TOCTOU (time‑of‑check‑to‑time‑of‑use) race condition that allows any local, unprivileged user to install arbitrary RPM packages as root. In plain English: a regular user on your system can become root without a password.
The issue affects PackageKit versions 1.0.2 through 1.3.4 and is present in many Linux distributions, including openSUSE Leap 15.6 and SUSE Linux Enterprise Desktop/Server 15 SP7. The fix is included in PackageKit 1.3.5 and later.
This guide is written as evergreen reference – the commands and mitigations will remain useful for months or years, regardless of when you read it
How to check if you are vulnerable
# Check which PackageKit version you have installed zypper info PackageKit | grep Version
- If the version is 1.0.2 through 1.3.4, you are vulnerable.
- If the version is 1.3.5 or higher, you are safe.
# Try to install a harmless dummy package as a regular user pkcon install cowsay
Alternative mitigation if you can’t update now
# Disable and stop the PackageKit service sudo systemctl stop packagekit sudo systemctl disable packagekit
2. Restrict PackageKit via polkit
sudo systemctl restart polkit
3. iptables / nftables (if the attack arrives over the network)
While this is a local race condition, some exploit chains involve a remote component. Blocking unnecessary incoming connections reduces attack surfac
# Example: block all incoming traffic except SSH (adjust to your needs) sudo iptables -P INPUT DROP sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT sudo iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
Conclusion & call to action
- Subscribe to the Linux Security Weekly newsletter – every Monday, five actionable security tips for Linux admins.
- Download the free checklist: “10 post‑update steps to verify no backdoor was installed” – get it by subscribing above.
- Go deeper: Buy Practical Binary Analysis or Practical Malware Analysis and stop chasing patches. Learn to find and fix the vulnerabilities you haven’t seen yet.

Nenhum comentário:
Postar um comentário