feat: detect PackageKit Pack2TheRoot (CVE-2026-41651)#634
Merged
carlospolop merged 1 commit intopeass-ng:masterfrom Apr 22, 2026
Merged
feat: detect PackageKit Pack2TheRoot (CVE-2026-41651)#634carlospolop merged 1 commit intopeass-ng:masterfrom
carlospolop merged 1 commit intopeass-ng:masterfrom
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Adds detection for Pack2TheRoot (CVE-2026-41651, CVSS 8.8), a cross-distro local privilege escalation in the PackageKit daemon, publicly disclosed on 2026-04-22 by Deutsche Telekom's Red Team in coordination with distribution maintainers.
Any unprivileged local user can exploit the flaw to install or remove system packages without authorization, leading to full root access on default installations of several major distributions.
Vulnerability details
>= 1.0.2and<= 1.3.4(1.0.2 was released ~12 years ago, so the attack surface is broad)What the check does
The new module
linPEAS/builder/linpeas_parts/7_software_information/PackageKit_Pack2TheRoot.sh:dpkg -l(Debian/Ubuntu) orrpm -qa(RHEL/Fedora/Rocky), stripping epoch and release suffixes.[1.0.2, 1.3.4]usingsort -V(POSIX-safe).systemctl status packagekitpkcon/pkmonbinaries (sufficient to trigger activation)emitted_finishedassertion failure crash injournalctl -u packagekit. The module counts these and flags them as possible prior exploitation.Output color coding
Following the existing conventions:
SED_RED_YELLOW→ confirmed vulnerable version, or IOC found (95% PE vector)SED_RED→ daemon is reachable from the current sessionSED_GREEN→ version out of range, or no IOC foundModule conventions
The file follows the same structure as
6_users_information/10_Pkexec.shand1_system_information/2_Sudo_version.sh:linpeasBuilder.py) withTitle,ID,Mitre,Functions Used,Generated Global Variables,Fat linpeas,Small linpeasT1068(Exploitation for Privilege Escalation)print_2title,print_3title,print_info,echo_not_found--smallbuilds (small linpeas: 1), not fat (fat linpeas: 0) — no third-party binary bundledTesting
Built and tested locally with:
Verified behavior on:
Not Foundbash -npassesChecklist
7_software_information)dpkg/rpm/journalctlare missingbash -nReferences