Bug 2460604 (CVE-2026-41651) - CVE-2026-41651 PackageKit: race condition vulnerability leads to arbitrary package installation as root
Summary: CVE-2026-41651 PackageKit: race condition vulnerability leads to arbitrary pa...
Keywords:
Status: NEW
Alias: CVE-2026-41651
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2460579 2460761
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-22 14:01 UTC by OSIDB Bzimport
Modified: 2026-05-14 12:57 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:11504 0 None None None 2026-04-29 06:24:12 UTC
Red Hat Product Errata RHSA-2026:11635 0 None None None 2026-04-29 11:16:50 UTC
Red Hat Product Errata RHSA-2026:17558 0 None None None 2026-05-14 12:50:10 UTC
Red Hat Product Errata RHSA-2026:17560 0 None None None 2026-05-14 12:57:08 UTC
Red Hat Product Errata RHSA-2026:17561 0 None None None 2026-05-14 12:56:32 UTC

Description OSIDB Bzimport 2026-04-22 14:01:52 UTC
PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. This is patched in version 1.3.5.

A local unprivileged user can install arbitrary RPM packages as root, including executing RPM scriptlets, without authentication. The vulnerability is a TOCTOU race condition on `transaction->cached_transaction_flags`  combined with a silent state-machine guard that discards illegal backward transitions while leaving corrupted flags in place. Three bugs exist in `src/pk-transaction.c`:
1. Unconditional flag overwrite (line 4036): `InstallFiles()` writes caller-supplied flags to `transaction->cached_transaction_flags` without checking whether the transaction has already been  authorized/started. A second call blindly overwrites the flags even while the transaction is RUNNING.
2. Silent state-transition rejection (lines 873–882): `pk_transaction_set_state()` silently discards backward state transitions (e.g. `RUNNING` → `WAITING_FOR_AUTH`) but the flag overwrite at step 1 already happened. The transaction continues running with corrupted flags.
3. Late flag read at execution time (lines 2273–2277): The scheduler's idle callback reads cached_transaction_flags at dispatch time, not at authorization time. If flags were overwritten between authorization and execution, the backend sees the attacker's flags.

Comment 4 errata-xmlrpc 2026-04-29 06:24:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:11504 https://access.redhat.com/errata/RHSA-2026:11504

Comment 5 errata-xmlrpc 2026-04-29 11:16:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:11635 https://access.redhat.com/errata/RHSA-2026:11635

Comment 6 errata-xmlrpc 2026-05-14 12:50:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2026:17558 https://access.redhat.com/errata/RHSA-2026:17558

Comment 7 errata-xmlrpc 2026-05-14 12:56:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2026:17561 https://access.redhat.com/errata/RHSA-2026:17561

Comment 8 errata-xmlrpc 2026-05-14 12:57:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2026:17560 https://access.redhat.com/errata/RHSA-2026:17560


Note You need to log in before you can comment on or make changes to this bug.