Affected packages

Ubuntu:22.04:LTS
packagekit

Package

Name
packagekit
Purl
pkg:deb/ubuntu/packagekit@1.2.5-2ubuntu3.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.5-2ubuntu3.1

Affected versions

1.*
1.2.2-2ubuntu3
1.2.4-1ubuntu1
1.2.4-1ubuntu2
1.2.5-1ubuntu1
1.2.5-2ubuntu1
1.2.5-2ubuntu2
1.2.5-2ubuntu3

Ecosystem specific

{
    "priority_reason": "Local privilege escalation to the root user.",
    "binaries": [
        {
            "binary_name": "gir1.2-packagekitglib-1.0",
            "binary_version": "1.2.5-2ubuntu3.1"
        },
        {
            "binary_name": "gstreamer1.0-packagekit",
            "binary_version": "1.2.5-2ubuntu3.1"
        },
        {
            "binary_name": "libpackagekit-glib2-18",
            "binary_version": "1.2.5-2ubuntu3.1"
        },
        {
            "binary_name": "packagekit",
            "binary_version": "1.2.5-2ubuntu3.1"
        },
        {
            "binary_name": "packagekit-command-not-found",
            "binary_version": "1.2.5-2ubuntu3.1"
        },
        {
            "binary_name": "packagekit-docs",
            "binary_version": "1.2.5-2ubuntu3.1"
        },
        {
            "binary_name": "packagekit-gtk3-module",
            "binary_version": "1.2.5-2ubuntu3.1"
        },
        {
            "binary_name": "packagekit-tools",
            "binary_version": "1.2.5-2ubuntu3.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-41651.json"
Ubuntu:24.04:LTS
packagekit

Package

Name
packagekit
Purl
pkg:deb/ubuntu/packagekit@1.2.8-2ubuntu1.5?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.8-2ubuntu1.5

Affected versions

1.*
1.2.7-1
1.2.8-1
1.2.8-1build1
1.2.8-2
1.2.8-2build2
1.2.8-2build3
1.2.8-2ubuntu1
1.2.8-2ubuntu1.1
1.2.8-2ubuntu1.2
1.2.8-2ubuntu1.4

Ecosystem specific

{
    "priority_reason": "Local privilege escalation to the root user.",
    "binaries": [
        {
            "binary_name": "gir1.2-packagekitglib-1.0",
            "binary_version": "1.2.8-2ubuntu1.5"
        },
        {
            "binary_name": "gstreamer1.0-packagekit",
            "binary_version": "1.2.8-2ubuntu1.5"
        },
        {
            "binary_name": "libpackagekit-glib2-18",
            "binary_version": "1.2.8-2ubuntu1.5"
        },
        {
            "binary_name": "packagekit",
            "binary_version": "1.2.8-2ubuntu1.5"
        },
        {
            "binary_name": "packagekit-command-not-found",
            "binary_version": "1.2.8-2ubuntu1.5"
        },
        {
            "binary_name": "packagekit-docs",
            "binary_version": "1.2.8-2ubuntu1.5"
        },
        {
            "binary_name": "packagekit-gtk3-module",
            "binary_version": "1.2.8-2ubuntu1.5"
        },
        {
            "binary_name": "packagekit-tools",
            "binary_version": "1.2.8-2ubuntu1.5"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-41651.json"
Ubuntu:25.10
packagekit

Package

Name
packagekit
Purl
pkg:deb/ubuntu/packagekit@1.3.1-1ubuntu1.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.1-1ubuntu1.1

Affected versions

1.*
1.3.0-3build1
1.3.1-1
1.3.1-1ubuntu1

Ecosystem specific

{
    "priority_reason": "Local privilege escalation to the root user.",
    "binaries": [
        {
            "binary_name": "gir1.2-packagekitglib-1.0",
            "binary_version": "1.3.1-1ubuntu1.1"
        },
        {
            "binary_name": "gstreamer1.0-packagekit",
            "binary_version": "1.3.1-1ubuntu1.1"
        },
        {
            "binary_name": "libpackagekit-glib2-18",
            "binary_version": "1.3.1-1ubuntu1.1"
        },
        {
            "binary_name": "packagekit",
            "binary_version": "1.3.1-1ubuntu1.1"
        },
        {
            "binary_name": "packagekit-command-not-found",
            "binary_version": "1.3.1-1ubuntu1.1"
        },
        {
            "binary_name": "packagekit-docs",
            "binary_version": "1.3.1-1ubuntu1.1"
        },
        {
            "binary_name": "packagekit-gtk3-module",
            "binary_version": "1.3.1-1ubuntu1.1"
        },
        {
            "binary_name": "packagekit-tools",
            "binary_version": "1.3.1-1ubuntu1.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-41651.json"
Ubuntu:26.04
packagekit

Package

Name
packagekit
Purl
pkg:deb/ubuntu/packagekit@1.3.4-3ubuntu1?arch=source&distro=resolute

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.4-3ubuntu1

Affected versions

1.*
1.3.1-1
1.3.2-1
1.3.3-1
1.3.4-1
1.3.4-3

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "gir1.2-packagekitglib-1.0",
            "binary_version": "1.3.4-3ubuntu1"
        },
        {
            "binary_name": "gstreamer1.0-packagekit",
            "binary_version": "1.3.4-3ubuntu1"
        },
        {
            "binary_name": "libpackagekit-glib2-18",
            "binary_version": "1.3.4-3ubuntu1"
        },
        {
            "binary_name": "packagekit",
            "binary_version": "1.3.4-3ubuntu1"
        },
        {
            "binary_name": "packagekit-command-not-found",
            "binary_version": "1.3.4-3ubuntu1"
        },
        {
            "binary_name": "packagekit-docs",
            "binary_version": "1.3.4-3ubuntu1"
        },
        {
            "binary_name": "packagekit-gtk3-module",
            "binary_version": "1.3.4-3ubuntu1"
        }
    ],
    "priority_reason": "Local privilege escalation to the root user."
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-41651.json"
Ubuntu:Pro:16.04:LTS
packagekit

Package

Name
packagekit
Purl
pkg:deb/ubuntu/packagekit@0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1

Affected versions

0.*
0.8.17-4ubuntu6~gcc5.3
0.8.17-4ubuntu6~gcc5.4ubuntu1
0.8.17-4ubuntu6~gcc5.4ubuntu1.1
0.8.17-4ubuntu6~gcc5.4ubuntu1.2
0.8.17-4ubuntu6~gcc5.4ubuntu1.3
0.8.17-4ubuntu6~gcc5.4ubuntu1.4
0.8.17-4ubuntu6~gcc5.4ubuntu1.5

Ecosystem specific

{
    "priority_reason": "Local privilege escalation to the root user.",
    "binaries": [
        {
            "binary_name": "gir1.2-packagekitglib-1.0",
            "binary_version": "0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1"
        },
        {
            "binary_name": "gstreamer1.0-packagekit",
            "binary_version": "0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1"
        },
        {
            "binary_name": "libpackagekit-glib2-16",
            "binary_version": "0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1"
        },
        {
            "binary_name": "packagekit",
            "binary_version": "0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1"
        },
        {
            "binary_name": "packagekit-backend-aptcc",
            "binary_version": "0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1"
        },
        {
            "binary_name": "packagekit-backend-smart",
            "binary_version": "0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1"
        },
        {
            "binary_name": "packagekit-docs",
            "binary_version": "0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1"
        },
        {
            "binary_name": "packagekit-gtk3-module",
            "binary_version": "0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1"
        },
        {
            "binary_name": "packagekit-tools",
            "binary_version": "0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1"
        },
        {
            "binary_name": "python3-packagekit",
            "binary_version": "0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-41651.json"
Ubuntu:Pro:18.04:LTS
packagekit

Package

Name
packagekit
Purl
pkg:deb/ubuntu/packagekit@1.1.9-1ubuntu2.18.04.6+esm1?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.9-1ubuntu2.18.04.6+esm1

Affected versions

1.*
1.1.7-1
1.1.9-1
1.1.9-1ubuntu1
1.1.9-1ubuntu2
1.1.9-1ubuntu2.18.04.1
1.1.9-1ubuntu2.18.04.3
1.1.9-1ubuntu2.18.04.4
1.1.9-1ubuntu2.18.04.5
1.1.9-1ubuntu2.18.04.6

Ecosystem specific

{
    "priority_reason": "Local privilege escalation to the root user.",
    "binaries": [
        {
            "binary_name": "gir1.2-packagekitglib-1.0",
            "binary_version": "1.1.9-1ubuntu2.18.04.6+esm1"
        },
        {
            "binary_name": "gstreamer1.0-packagekit",
            "binary_version": "1.1.9-1ubuntu2.18.04.6+esm1"
        },
        {
            "binary_name": "libpackagekit-glib2-18",
            "binary_version": "1.1.9-1ubuntu2.18.04.6+esm1"
        },
        {
            "binary_name": "packagekit",
            "binary_version": "1.1.9-1ubuntu2.18.04.6+esm1"
        },
        {
            "binary_name": "packagekit-command-not-found",
            "binary_version": "1.1.9-1ubuntu2.18.04.6+esm1"
        },
        {
            "binary_name": "packagekit-docs",
            "binary_version": "1.1.9-1ubuntu2.18.04.6+esm1"
        },
        {
            "binary_name": "packagekit-gtk3-module",
            "binary_version": "1.1.9-1ubuntu2.18.04.6+esm1"
        },
        {
            "binary_name": "packagekit-tools",
            "binary_version": "1.1.9-1ubuntu2.18.04.6+esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-41651.json"
Ubuntu:Pro:20.04:LTS
packagekit

Package

Name
packagekit
Purl
pkg:deb/ubuntu/packagekit@1.1.13-2ubuntu1.1+esm1?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.13-2ubuntu1.1+esm1

Affected versions

1.*
1.1.12-5ubuntu4
1.1.13-1
1.1.13-2
1.1.13-2build1
1.1.13-2ubuntu1
1.1.13-2ubuntu1.1

Ecosystem specific

{
    "priority_reason": "Local privilege escalation to the root user.",
    "binaries": [
        {
            "binary_name": "gir1.2-packagekitglib-1.0",
            "binary_version": "1.1.13-2ubuntu1.1+esm1"
        },
        {
            "binary_name": "gstreamer1.0-packagekit",
            "binary_version": "1.1.13-2ubuntu1.1+esm1"
        },
        {
            "binary_name": "libpackagekit-glib2-18",
            "binary_version": "1.1.13-2ubuntu1.1+esm1"
        },
        {
            "binary_name": "packagekit",
            "binary_version": "1.1.13-2ubuntu1.1+esm1"
        },
        {
            "binary_name": "packagekit-command-not-found",
            "binary_version": "1.1.13-2ubuntu1.1+esm1"
        },
        {
            "binary_name": "packagekit-docs",
            "binary_version": "1.1.13-2ubuntu1.1+esm1"
        },
        {
            "binary_name": "packagekit-gtk3-module",
            "binary_version": "1.1.13-2ubuntu1.1+esm1"
        },
        {
            "binary_name": "packagekit-tools",
            "binary_version": "1.1.13-2ubuntu1.1+esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-41651.json"