home.social

#pack2theroot — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #pack2theroot, aggregated by home.social.

  1. 📢⚠️ exposes a 12-year-old flaw in Linux’s PackageKit, letting unprivileged users gain root access in seconds. Affects major distros, patch now

    Read: hackread.com/pack2theroot-linu

  2. 📢⚠️ #Pack2TheRoot exposes a 12-year-old flaw in Linux’s PackageKit, letting unprivileged users gain root access in seconds. Affects major distros, patch now

    Read: hackread.com/pack2theroot-linu

    #Linux #CyberSecurity #Vulnerability #PackageKit

  3. 📢⚠️ #Pack2TheRoot exposes a 12-year-old flaw in Linux’s PackageKit, letting unprivileged users gain root access in seconds. Affects major distros, patch now

    Read: hackread.com/pack2theroot-linu

    #Linux #CyberSecurity #Vulnerability #PackageKit

  4. 📢⚠️ #Pack2TheRoot exposes a 12-year-old flaw in Linux’s PackageKit, letting unprivileged users gain root access in seconds. Affects major distros, patch now

    Read: hackread.com/pack2theroot-linu

    #Linux #CyberSecurity #Vulnerability #PackageKit

  5. 📢⚠️ #Pack2TheRoot exposes a 12-year-old flaw in Linux’s PackageKit, letting unprivileged users gain root access in seconds. Affects major distros, patch now

    Read: hackread.com/pack2theroot-linu

    #Linux #CyberSecurity #Vulnerability #PackageKit

  6. #Pack2TheRoot “: #Sicherheitslücke betrifft mehrere #Linux-Distributionen.

    Das #Telekom- #Sicherheitsteam hat die Sicherheitslücke „Pack2TheRoot“ entdeckt, die #Rechteausweitung in mehreren #Distributionen ermöglicht.

    Das meldet die Telekom auf ihren Sicherheitsseiten. #PackageKit ist ein #Abstraktions_Layer für #D_Bus zum eigentlich sicheren Verwalten von Paketen für beliebige #Distributionen und #Architekturen...

    heise.de/news/Pack2TheRoot-Sic

  7. #Pack2TheRoot “: #Sicherheitslücke betrifft mehrere #Linux-Distributionen.

    Das #Telekom- #Sicherheitsteam hat die Sicherheitslücke „Pack2TheRoot“ entdeckt, die #Rechteausweitung in mehreren #Distributionen ermöglicht.

    Das meldet die Telekom auf ihren Sicherheitsseiten. #PackageKit ist ein #Abstraktions_Layer für #D_Bus zum eigentlich sicheren Verwalten von Paketen für beliebige #Distributionen und #Architekturen...

    heise.de/news/Pack2TheRoot-Sic

  8. #Pack2TheRoot “: #Sicherheitslücke betrifft mehrere #Linux-Distributionen.

    Das #Telekom- #Sicherheitsteam hat die Sicherheitslücke „Pack2TheRoot“ entdeckt, die #Rechteausweitung in mehreren #Distributionen ermöglicht.

    Das meldet die Telekom auf ihren Sicherheitsseiten. #PackageKit ist ein #Abstraktions_Layer für #D_Bus zum eigentlich sicheren Verwalten von Paketen für beliebige #Distributionen und #Architekturen...

    heise.de/news/Pack2TheRoot-Sic

  9. #Pack2TheRoot “: #Sicherheitslücke betrifft mehrere #Linux-Distributionen.

    Das #Telekom- #Sicherheitsteam hat die Sicherheitslücke „Pack2TheRoot“ entdeckt, die #Rechteausweitung in mehreren #Distributionen ermöglicht.

    Das meldet die Telekom auf ihren Sicherheitsseiten. #PackageKit ist ein #Abstraktions_Layer für #D_Bus zum eigentlich sicheren Verwalten von Paketen für beliebige #Distributionen und #Architekturen...

    heise.de/news/Pack2TheRoot-Sic

  10. #Pack2TheRoot “: #Sicherheitslücke betrifft mehrere #Linux-Distributionen.

    Das #Telekom- #Sicherheitsteam hat die Sicherheitslücke „Pack2TheRoot“ entdeckt, die #Rechteausweitung in mehreren #Distributionen ermöglicht.

    Das meldet die Telekom auf ihren Sicherheitsseiten. #PackageKit ist ein #Abstraktions_Layer für #D_Bus zum eigentlich sicheren Verwalten von Paketen für beliebige #Distributionen und #Architekturen...

    heise.de/news/Pack2TheRoot-Sic

  11. ⚠️🔒 "Pack2TheRoot" erlaubt laut Telekom‑Security in PackageKit eine Privilegien‑Escalation (TOCTOU, CVE‑2026‑41651, CVSS 8.8). Mehrere Standard‑Distros betroffen — Update auf PackageKit ≥1.3.5 und zeitnahe System‑Patches empfohlen. heise.de/news/Pack2TheRoot-Sic #Pack2TheRoot #Linux #Security #PackageKit 🐧

  12. ⚠️🔒 "Pack2TheRoot" erlaubt laut Telekom‑Security in PackageKit eine Privilegien‑Escalation (TOCTOU, CVE‑2026‑41651, CVSS 8.8). Mehrere Standard‑Distros betroffen — Update auf PackageKit ≥1.3.5 und zeitnahe System‑Patches empfohlen. heise.de/news/Pack2TheRoot-Sic #Pack2TheRoot #Linux #Security #PackageKit 🐧

  13. ⚠️🔒 "Pack2TheRoot" erlaubt laut Telekom‑Security in PackageKit eine Privilegien‑Escalation (TOCTOU, CVE‑2026‑41651, CVSS 8.8). Mehrere Standard‑Distros betroffen — Update auf PackageKit ≥1.3.5 und zeitnahe System‑Patches empfohlen. heise.de/news/Pack2TheRoot-Sic #Pack2TheRoot #Linux #Security #PackageKit 🐧

  14. ⚠️🔒 "Pack2TheRoot" erlaubt laut Telekom‑Security in PackageKit eine Privilegien‑Escalation (TOCTOU, CVE‑2026‑41651, CVSS 8.8). Mehrere Standard‑Distros betroffen — Update auf PackageKit ≥1.3.5 und zeitnahe System‑Patches empfohlen. heise.de/news/Pack2TheRoot-Sic 🐧

  15. ⚠️🔒 "Pack2TheRoot" erlaubt laut Telekom‑Security in PackageKit eine Privilegien‑Escalation (TOCTOU, CVE‑2026‑41651, CVSS 8.8). Mehrere Standard‑Distros betroffen — Update auf PackageKit ≥1.3.5 und zeitnahe System‑Patches empfohlen. heise.de/news/Pack2TheRoot-Sic #Pack2TheRoot #Linux #Security #PackageKit 🐧

  16. Discover the Pack2TheRoot flaw, a high-severity vulnerability (CVE-2026-41651) in PackageKit that has granted local users root access on Linux systems for nearly 12 years. This incident, where AI helped uncover the bug, forces a critical reevaluation of how we audit foundational open-source components. Learn which distributions are affected and why immediate patching to PackageKit 1.3.5 is…

    tpp.blog/1ybpbp2

    #cybersecurity #pack2theroot #packagekit

    🤖 This post was AI-generated.

  17. 🚨 CVE-2026-41651 (Pack2TheRoot)

    PackageKit vulnerable to TOCTOU Race on Transaction Flags leads to arbitrary package installation as root

    PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. This is patched in version 1.3.5.

    ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/

    #nttdata #zen #secdb #infosec
    #pack2theroot #cve2026411651 #packagekit #toctou

  18. 🚨 CVE-2026-41651 (Pack2TheRoot)

    PackageKit vulnerable to TOCTOU Race on Transaction Flags leads to arbitrary package installation as root

    PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. This is patched in version 1.3.5.

    ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/

    #nttdata #zen #secdb #infosec
    #pack2theroot #cve2026411651 #packagekit #toctou

  19. 🚨 CVE-2026-41651 (Pack2TheRoot)

    PackageKit vulnerable to TOCTOU Race on Transaction Flags leads to arbitrary package installation as root

    PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. This is patched in version 1.3.5.

    ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/

    #nttdata #zen #secdb #infosec
    #pack2theroot #cve2026411651 #packagekit #toctou

  20. Forgot your root password? No problem! With #PackageKit <= 1.3.4 you can do all the fun root action on any Linux system you have local access to, no privileges required!

    Don't like that? Then PLEASE UPDATE your system ASAP to PackageKit >= 1.3.5 or any fixed distro package. Fixes for this vulnerability should already be available everywhere since today.

    You can read more about CVE-2026-41651 on the security researcher's blog:
    github.security.telekom.com/20

    #pack2theroot #osssecurity

  21. Forgot your root password? No problem! With #PackageKit <= 1.3.4 you can do all the fun root action on any Linux system you have local access to, no privileges required!

    Don't like that? Then PLEASE UPDATE your system ASAP to PackageKit >= 1.3.5 or any fixed distro package. Fixes for this vulnerability should already be available everywhere since today.

    You can read more about CVE-2026-41651 on the security researcher's blog:
    github.security.telekom.com/20

    #pack2theroot #osssecurity

  22. Forgot your root password? No problem! With #PackageKit <= 1.3.4 you can do all the fun root action on any Linux system you have local access to, no privileges required!

    Don't like that? Then PLEASE UPDATE your system ASAP to PackageKit >= 1.3.5 or any fixed distro package. Fixes for this vulnerability should already be available everywhere since today.

    You can read more about CVE-2026-41651 on the security researcher's blog:
    github.security.telekom.com/20

    #pack2theroot #osssecurity

  23. Forgot your root password? No problem! With #PackageKit <= 1.3.4 you can do all the fun root action on any Linux system you have local access to, no privileges required!

    Don't like that? Then PLEASE UPDATE your system ASAP to PackageKit >= 1.3.5 or any fixed distro package. Fixes for this vulnerability should already be available everywhere since today.

    You can read more about CVE-2026-41651 on the security researcher's blog:
    github.security.telekom.com/20

    #pack2theroot #osssecurity

  24. Forgot your root password? No problem! With #PackageKit <= 1.3.4 you can do all the fun root action on any Linux system you have local access to, no privileges required!

    Don't like that? Then PLEASE UPDATE your system ASAP to PackageKit >= 1.3.5 or any fixed distro package. Fixes for this vulnerability should already be available everywhere since today.

    You can read more about CVE-2026-41651 on the security researcher's blog:
    github.security.telekom.com/20

    #pack2theroot #osssecurity