Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    American utility firm Itron discloses breach of internal IT network

    April 26, 2026

    SSA-625789 V1.4 (Last Update: 2025-10-14): Multiple Vulnerabilities in SIMATIC S7-1200 CPU V1/V2 Devices

    April 26, 2026

    SSA-614723 V1.2 (Last Update: 2025-10-14): Denial of Service Vulnerabilities in User Management Component (UMC)

    April 26, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»New ‘Pack2TheRoot’ flaw gives hackers root Linux access
    News

    New ‘Pack2TheRoot’ flaw gives hackers root Linux access

    adminBy adminApril 26, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    New ‘Pack2TheRoot’ flaw gives hackers root Linux access

    A new vulnerability dubbed Pack2TheRoot could be exploited in the PackageKit daemon to allow local Linux users to install or remove system packages and gain root permissions.

    The flaw is identified as CVE-2026-41651 and received a high-severity rating of 8.8 out of 10. It has persisted for almost 12 years in the PackageKit daemon, a background service that manages software installation, updates, and removal across Linux systems.

    Earlier this week, some information about the vulnerability has been published, along with PackageKit version 1.3.5 that addresses the issue. However, technical details and a demo exploit have been not been disclosed to allow the patches to propagate.

    image

    An investigation from the Deutsche Telekom Red Team uncovered that the cause of the bug is the mechanism PackageKit uses to handle package management requests.

    Specifically, the researchers found that commands like ‘pkcon install’ could execute without requiring authentication under certain conditions on a Fedora system, allowing them to install a system package.

    Using the Claude Opus AI tool, they further explored the potential for exploiting this behavior and discovered CVE-2026-41651.

    Redacted PoC exploit for Pack2TheRoot
    Redacted PoC exploit for Pack2TheRoot
    Source: Deutsche Telekom

    Impact and fixes

    Deutsche Telekom’s Red Team reported their findings to Red Hat and PackageKit maintainers on April 8. They state that it’s safe to assume that all distributions that come with PackageKit pre-installed and enabled out-of-the-box are vulnerable to CVE-2026-41651.

    The vulnerability has been present in PackageKit version 1.0.2, released in November 2014, and affects all versions through 1.3.4, according to the project’s security advisory.

    Researchers’ testing have confirmed that an attacker could exploit the the CVE-2026-41651 vulnerability in the following Linux distributions:

    • Ubuntu Desktop 18.04 (EOL), 24.04.4 (LTS), 26.04 (LTS beta)
    • Ubuntu Server 22.04 – 24.04 (LTS)
    • Debian Desktop Trixie 13.4
    • RockyLinux Desktop 10.1
    • Fedora 43 Desktop
    • Fedora 43 Server

    The list is not exhaustive, though, and any Linux distribution using PackageKit should be treated as potentially vulnerable to attacks.

    Users should upgrade to PackageKit version 1.3.5 as soon as possible, and ensure that any other software using the package as a dependency has been moved to a safe release.

    Users can use the commands below to check if they have a vulnerable version of the PackageKit installed and if the daemon is running:

    dpkg -l | grep -i packagekit

    rpm -qa | grep -i packagekit

    Users can run systemctl status packagekit or pkmon to check if the PackageKit daemon is available and running, which indicates that the system may be at risk if left unpatched.

    Although no details about the state of exploitation have been shared, the researchers noted that there are strong signs showing compromise because exploitation leads to the PackageKit daemon hitting an assertion failure and crashing.

    Even if systemd recovers the daemon, the crash is observable in the system logs.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCVE-2026-7036 | THREATINT
    Next Article SSA-614723 V1.2 (Last Update: 2025-10-14): Denial of Service Vulnerabilities in User Management Component (UMC)
    admin
    • Website

    Related Posts

    News

    American utility firm Itron discloses breach of internal IT network

    April 26, 2026
    News

    Understanding Exploits | Blog | VulnCheck

    April 26, 2026
    News

    Microsoft to roll out Entra passkeys on Windows in late April

    April 26, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202662 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202662 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    American utility firm Itron discloses breach of internal IT network

    April 26, 2026

    SSA-625789 V1.4 (Last Update: 2025-10-14): Multiple Vulnerabilities in SIMATIC S7-1200 CPU V1/V2 Devices

    April 26, 2026

    SSA-614723 V1.2 (Last Update: 2025-10-14): Denial of Service Vulnerabilities in User Management Component (UMC)

    April 26, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.