<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>PackageKit | 今天abc看了啥🤔</title><description>现在我也不知道这频道发了啥了，各位慢慢吃瓜，将就着看联系我请去 @abc1763613206友链儿@cyberElaina@rvalue_daily@billchenla</description><link>https://channel.0w0.best</link><item><title>🔴 PackageKit 本地提权漏洞；请尽快升级至 1.3.5</title><link>https://channel.0w0.best/posts/7231</link><guid isPermaLink="true">https://channel.0w0.best/posts/7231</guid><pubDate>Wed, 22 Apr 2026 14:07:25 GMT</pubDate><content:encoded>&lt;i&gt;&lt;b&gt;🔴&lt;/b&gt;&lt;/i&gt; &lt;mark&gt;PackageKit&lt;/mark&gt; 本地提权漏洞；请尽快升级至 1.3.5。&lt;br /&gt;&lt;br /&gt;- 修复版本 1.3.5 在约两小时前发布。&lt;br /&gt;- &lt;mark&gt;PackageKit&lt;/mark&gt; 是许多包管理器的后端，在 Ubuntu、Debian、Fedora 等发行版上被广泛应用；最早受影响版本 1.0.2 版本在 12 年前发布。&lt;br /&gt;- 鉴于以上情况，目前大部分正在运行的 Linux 系统都受此漏洞影响，建议系统管理员在更新版本于发行版发布后及时更新。&lt;br /&gt;&lt;br /&gt;CVSS: 8.8/10&lt;br /&gt;Affect: [1.0.2, 1.3.4]&lt;br /&gt;&lt;br /&gt;- &lt;a href=&quot;https://github.com/PackageKit/PackageKit/security/advisories/GHSA-f55j-vvr9-69xv&quot; target=&quot;_blank&quot;&gt;GHSA-f55j-vvr9-69xv&lt;/a&gt;&lt;br /&gt;- &lt;a href=&quot;https://github.security.telekom.com/2026/04/pack2theroot-linux-local-privilege-escalation.html&quot; target=&quot;_blank&quot;&gt;github.security.telekom.com/~&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;linksrc: &lt;a href=&quot;https://t.me/bupt_moe/2712&quot; target=&quot;_blank&quot;&gt;https://t.me/bupt_moe/2712&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;/search/%23Security&quot;&gt;#Security&lt;/a&gt; &lt;a href=&quot;/search/%23PackageKit&quot;&gt;#PackageKit&lt;/a&gt;&lt;a href=&quot;https://github.com/PackageKit/PackageKit/security/advisories/GHSA-f55j-vvr9-69xv&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;GitHub&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Race condition vulnerability leads to arbitrary package installation as root&quot; src=&quot;/static/https://cdn4.telesco.pe/file/GD_FPBUlPdNKSJj8Ze0NJMaqUIJHaKMlSqh0Y6Lqse4U3GTO9SUhc12Pbwisb5etvUHeQmWzKMX3RiqYvuiwNNKqvBZMh1BmEU25ER56u_vXKEY93QsC0F0GFBu-vH6nPPa_0U1gvb8RVzt_GcLaYjx-u-85wWjL1_F-yfvbJ0KUjGpHE7R8kCN2OuWRV3aZx95x2E8Tt3crQPEwpzdl7WwRXEocQ75k81C3GpadrSXl_yR6usd0MO7CXQZB-G8TMpFzVgWfxqcsYlG6BmT2NC5w8hdLWcROQ93Jn0BY5wpy8I1B8Dq2DnFFz6vyACmPJGuSQfAFvpdmpNq7wLQ_Zg.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;Race condition vulnerability leads to arbitrary package installation as root&lt;/div&gt;
  &lt;div&gt;This report explains a vulnerability within &lt;mark&gt;PackageKit&lt;/mark&gt;, that allows unprivileged user installing packages as root and thus leads to a local privilege escalation. &lt;br /&gt; &lt;br /&gt;All &lt;mark&gt;PackageKit&lt;/mark&gt; versions between ...&lt;/div&gt;
&lt;/a&gt;</content:encoded></item></channel></rss>