StackPatch is liveSee product

Back to CVE digest
CVE-2026-41651 · cross-distro fix matrix

CVE-2026-41651: USN-8195-1 fixed a vulnerability in PackageKit. This update provides

Affects 6 Linux releases across 32 (distro × package) combinations. First disclosed: 2026-04-29.

Fix per ecosystem

Each block below is a distro release where CVE-2026-41651 has a known fix. Run the listed command on that distro to remediate.

Ubuntu bionic

Source: Ubuntu USN

  • packagekit→ fixed in1.1.9-1ubuntu2.18.04.6+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y packagekit
  • gir1.2-packagekitglib-1.0→ fixed in1.1.9-1ubuntu2.18.04.6+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y gir1.2-packagekitglib-1.0
  • gstreamer1.0-packagekit→ fixed in1.1.9-1ubuntu2.18.04.6+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y gstreamer1.0-packagekit
  • libpackagekit-glib2-18→ fixed in1.1.9-1ubuntu2.18.04.6+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y libpackagekit-glib2-18
  • libpackagekit-glib2-dev→ fixed in1.1.9-1ubuntu2.18.04.6+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y libpackagekit-glib2-dev
  • packagekit-command-not-found→ fixed in1.1.9-1ubuntu2.18.04.6+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y packagekit-command-not-found
  • packagekit-docs→ fixed in1.1.9-1ubuntu2.18.04.6+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y packagekit-docs
  • packagekit-gtk3-module→ fixed in1.1.9-1ubuntu2.18.04.6+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y packagekit-gtk3-module
  • packagekit-tools→ fixed in1.1.9-1ubuntu2.18.04.6+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y packagekit-tools

Ubuntu focal

Source: Ubuntu USN

  • packagekit→ fixed in1.1.13-2ubuntu1.1+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y packagekit
  • gir1.2-packagekitglib-1.0→ fixed in1.1.13-2ubuntu1.1+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y gir1.2-packagekitglib-1.0
  • gstreamer1.0-packagekit→ fixed in1.1.13-2ubuntu1.1+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y gstreamer1.0-packagekit
  • libpackagekit-glib2-18→ fixed in1.1.13-2ubuntu1.1+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y libpackagekit-glib2-18
  • libpackagekit-glib2-dev→ fixed in1.1.13-2ubuntu1.1+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y libpackagekit-glib2-dev
  • packagekit-command-not-found→ fixed in1.1.13-2ubuntu1.1+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y packagekit-command-not-found
  • packagekit-docs→ fixed in1.1.13-2ubuntu1.1+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y packagekit-docs
  • packagekit-gtk3-module→ fixed in1.1.13-2ubuntu1.1+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y packagekit-gtk3-module
  • packagekit-tools→ fixed in1.1.13-2ubuntu1.1+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y packagekit-tools

Ubuntu xenial

Source: Ubuntu USN

  • packagekit→ fixed in0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y packagekit
  • gir1.2-packagekitglib-1.0→ fixed in0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y gir1.2-packagekitglib-1.0
  • gstreamer1.0-packagekit→ fixed in0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y gstreamer1.0-packagekit
  • libpackagekit-glib2-16→ fixed in0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y libpackagekit-glib2-16
  • libpackagekit-glib2-dev→ fixed in0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y libpackagekit-glib2-dev
  • packagekit-backend-aptcc→ fixed in0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y packagekit-backend-aptcc
  • packagekit-backend-smart→ fixed in0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y packagekit-backend-smart
  • packagekit-docs→ fixed in0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y packagekit-docs
  • packagekit-gtk3-module→ fixed in0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y packagekit-gtk3-module
  • packagekit-tools→ fixed in0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y packagekit-tools
  • python3-packagekit→ fixed in0.8.17-4ubuntu6~gcc5.4ubuntu1.5+esm1USN-8195-3
    sudo apt-get install --only-upgrade -y python3-packagekit

Debian bullseye

Source: Debian Security Tracker

  • packagekit→ fixed in1.2.2-2+deb11u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y packagekit

Debian bookworm

Source: Debian Security Tracker

  • packagekit→ fixed in1.2.6-5+deb12u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y packagekit

Debian trixie

Source: Debian Security Tracker

  • packagekit→ fixed in1.3.1-1+deb13u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y packagekit
Are YOU affected by CVE-2026-41651?

5-second check on your actual server. Reads /etc/os-release, uname -r, and the distro's package manager; matches against this same cross-source index live.

curl https://mindsparkstack.com/scan.sh | bash
Continuous monitoring beats manual checking

CVE-2026-41651dropped silently in your distro's update channel. Every new CVE is the same story. StackPatch runs the matcher hourly against all 5 sources and emails the exact remediation when something new applies to one of your servers. $99 lifetime, 50 founder seats, 30-day refund.

See StackPatch ($99 lifetime)