CVE-2026-21436

5.5 MEDIUM

📋 TL;DR

This vulnerability in eopkg allows malicious packages to bypass the --destdir parameter and install files outside the intended directory. Only users installing packages from untrusted sources are affected, as the official Solus repositories are safe.

💻 Affected Systems

Products:
  • eopkg
Versions: All versions prior to 4.4.0
Operating Systems: Solus Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when installing packages from non-official repositories or untrusted sources.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could install arbitrary files anywhere on the filesystem, potentially leading to system compromise, persistence mechanisms, or privilege escalation.

🟠

Likely Case

Malicious packages from compromised third-party repositories could install backdoors, cryptocurrency miners, or other unwanted software in unexpected locations.

🟢

If Mitigated

If users only install from official Solus repositories, there is no impact as those packages are trusted and verified.

🌐 Internet-Facing: LOW - eopkg is a package manager typically used locally, not directly internet-facing.
🏢 Internal Only: MEDIUM - The risk exists when installing packages from untrusted sources within internal networks or development environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires creating or compromising a package source, then convincing a user to install from that source.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.4.0

Vendor Advisory: https://github.com/getsolus/eopkg/security/advisories/GHSA-786v-47cq-qm6m

Restart Required: No

Instructions:

1. Update eopkg using: sudo eopkg upgrade eopkg
2. Verify version with: eopkg --version
3. Ensure version is 4.4.0 or higher

🔧 Temporary Workarounds

Restrict package sources

linux

Only install packages from official Solus repositories

# Remove any unofficial repositories from /etc/eopkg/repos.d/
# Only keep official Solus repository files

🧯 If You Can't Patch

  • Only install packages from official Solus repositories
  • Audit and remove any third-party package repositories

🔍 How to Verify

Check if Vulnerable:

Check eopkg version: eopkg --version | grep -E '^eopkg'

Check Version:

eopkg --version

Verify Fix Applied:

Confirm version is 4.4.0 or higher: eopkg --version

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file installations outside normal package directories
  • Package installations from non-official repositories

Network Indicators:

  • Downloads from unofficial package repositories

SIEM Query:

Process execution: eopkg install with non-standard repository URLs

🔗 References

📤 Share & Export