Impact
PackageKit contains a TOCTOU race on transaction flags that lets an unprivileged user overwrite the cached flags while a transaction is running; the unchecked flag overwrite, silent rejection of backward state transitions, and delayed flag read allow the attacker to set install flags that cause the package backend to install arbitrary RPMs with root privileges, executing any scriptlets contained in the package.
Affected Systems
The vulnerability affects PackageKit versions 1.0.2 through 1.3.4 on Linux distributions that use PackageKit as the D‑Bus abstraction layer for package management.
Risk and Exploitability
The flaw yields a CVSS score of 8.8, with no EPSS score available but the exploit is believed to be feasible because it requires only local access and no network communication; the vulnerability is not listed in the CISA KEV catalog, yet the local nature of the attack coupled with the high severity means that it should be addressed promptly on any systems running the affected PackageKit versions.
OpenCVE Enrichment