<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>PackageKit | 今天abc看了啥🤔</title><description>现在我也不知道这频道发了啥了，各位慢慢吃瓜，将就着看联系我请去 @abc1763613206友链儿@cyberElaina@rvalue_daily@billchenla</description><link>https://broadcastchannel-ajj.pages.dev</link><item><title>🔴 PackageKit 本地提权漏洞；请尽快升级至 1.3.5</title><link>https://broadcastchannel-ajj.pages.dev/posts/7231</link><guid isPermaLink="true">https://broadcastchannel-ajj.pages.dev/posts/7231</guid><pubDate>Wed, 22 Apr 2026 14:07:25 GMT</pubDate><content:encoded>&lt;i&gt;&lt;b&gt;🔴&lt;/b&gt;&lt;/i&gt; &lt;mark&gt;PackageKit&lt;/mark&gt; 本地提权漏洞；请尽快升级至 1.3.5。&lt;br /&gt;&lt;br /&gt;- 修复版本 1.3.5 在约两小时前发布。&lt;br /&gt;- &lt;mark&gt;PackageKit&lt;/mark&gt; 是许多包管理器的后端，在 Ubuntu、Debian、Fedora 等发行版上被广泛应用；最早受影响版本 1.0.2 版本在 12 年前发布。&lt;br /&gt;- 鉴于以上情况，目前大部分正在运行的 Linux 系统都受此漏洞影响，建议系统管理员在更新版本于发行版发布后及时更新。&lt;br /&gt;&lt;br /&gt;CVSS: 8.8/10&lt;br /&gt;Affect: [1.0.2, 1.3.4]&lt;br /&gt;&lt;br /&gt;- &lt;a href=&quot;https://github.com/PackageKit/PackageKit/security/advisories/GHSA-f55j-vvr9-69xv&quot; target=&quot;_blank&quot;&gt;GHSA-f55j-vvr9-69xv&lt;/a&gt;&lt;br /&gt;- &lt;a href=&quot;https://github.security.telekom.com/2026/04/pack2theroot-linux-local-privilege-escalation.html&quot; target=&quot;_blank&quot;&gt;github.security.telekom.com/~&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;linksrc: &lt;a href=&quot;https://t.me/bupt_moe/2712&quot; target=&quot;_blank&quot;&gt;https://t.me/bupt_moe/2712&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;/search/%23Security&quot;&gt;#Security&lt;/a&gt; &lt;a href=&quot;/search/%23PackageKit&quot;&gt;#PackageKit&lt;/a&gt;&lt;a href=&quot;https://github.com/PackageKit/PackageKit/security/advisories/GHSA-f55j-vvr9-69xv&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;GitHub&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Race condition vulnerability leads to arbitrary package installation as root&quot; src=&quot;/static/https://cdn4.telesco.pe/file/DBdPpLF-5fUUa1loZEwN0Lh3buFqR_pAfhXjhm76NCQ7qflgRFq5PoCsb6MuDfM1kCCSdd3cL4L7IaKYAkVtSj-hCmPFARY_D8D_rvh4LtJ0o8YxriaVF9NjantcwWQdaNk3pkd8pwVHetgI726rpICrESosQZxNyLSXMz0p_jJmSFjAjEvuNSz5UZ8N2MOr1qxMCwoMVmClc_Hfw6c4GLdmOwTcjbIJjQ-p5I9W38avSSnZNOp0OaunH090PNtZ_hyfyY9y-ycimwSvSe3Js4SDd15691BHhotYQkVTIFPAEpFU57YsgpniBdKMl0acGCwErwQNiwTQ2uJBbRQztQ.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;Race condition vulnerability leads to arbitrary package installation as root&lt;/div&gt;
  &lt;div&gt;This report explains a vulnerability within &lt;mark&gt;PackageKit&lt;/mark&gt;, that allows unprivileged user installing packages as root and thus leads to a local privilege escalation. &lt;br /&gt; &lt;br /&gt;All &lt;mark&gt;PackageKit&lt;/mark&gt; versions between ...&lt;/div&gt;
&lt;/a&gt;</content:encoded></item></channel></rss>