Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

798+ Articles
120+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. New 'Pack2TheRoot' Flaw Gives Hackers Root Linux Access
New 'Pack2TheRoot' Flaw Gives Hackers Root Linux Access
NEWS

New 'Pack2TheRoot' Flaw Gives Hackers Root Linux Access

A newly disclosed vulnerability in the PackageKit daemon, dubbed Pack2TheRoot, allows local Linux users to escalate privileges to root by abusing the package manager's polkit integration. The flaw affects most major Linux distributions and has no user-visible indication that anything unusual has occurred.

Dylan H.

News Desk

April 26, 2026
5 min read

A newly discovered vulnerability nicknamed Pack2TheRoot has been disclosed in the PackageKit daemon — the cross-distribution package management framework used across Ubuntu, Fedora, Debian, openSUSE, and other major Linux distributions. The flaw allows a local, unprivileged user to escalate their privileges to root by exploiting how PackageKit interacts with the system's polkit authorization framework.

What Is PackageKit

PackageKit is an abstraction layer that provides a unified interface for managing software packages across different Linux distribution package managers (apt, dnf, zypper, etc.). It runs as a system daemon and is used by graphical software centers such as GNOME Software and KDE Discover to allow users to install and remove packages without requiring direct root shell access.

Because PackageKit needs root-level access to install and remove system software, it relies on polkit (formerly PolicyKit) to make fine-grained authorization decisions about what individual users are permitted to do without entering a root password.

The Pack2TheRoot Vulnerability

The flaw resides in how PackageKit validates and processes certain package installation requests through its polkit policy rules. Under normal operation, polkit is supposed to enforce authorization checks that restrict which users can install or remove system packages. However, researchers found that a crafted request could bypass these authorization checks, causing PackageKit to execute the installation or removal operation with root privileges on behalf of an unprivileged user.

The attack requires:

  • Local access to the system (either physical, SSH, or any other local session)
  • A standard (non-privileged) user account — no sudo access required
  • The ability to invoke PackageKit, which is available to local users by default on desktop Linux installations

Once exploited, the attacker can:

  1. Install arbitrary packages — including ones that add backdoor accounts, deploy persistence mechanisms, or include malicious binaries
  2. Remove security-relevant packages — including antivirus tools, monitoring agents, SELinux/AppArmor policy packages, or audit logging daemons
  3. Gain a root shell by installing a package that triggers post-install scripts executing with elevated privileges

The attack leaves minimal traces by default, as PackageKit-initiated installations are not unusual on desktop systems and may not trigger security monitoring rules.

Why This Matters

Linux privilege escalation vulnerabilities affecting polkit have a troubling history. The PwnKit vulnerability (CVE-2021-4034), disclosed in January 2022, affected polkit directly and allowed unprivileged users to gain root on virtually every major Linux distribution. It had existed undetected for over 12 years. Pack2TheRoot follows a similar pattern: it abuses a trusted, widely-deployed system component that runs with elevated privileges.

What makes Pack2TheRoot particularly concerning:

  • Wide distribution coverage: PackageKit is installed by default on most desktop-oriented Linux distributions and many server distributions
  • Low barrier to exploit: No special tooling is required — the attack can be performed using standard PackageKit API calls
  • Silent execution: Legitimate package operations do not generate conspicuous alerts, making detection difficult without dedicated audit logging

For organizations running Linux desktops, shared development servers, or multi-user systems, a single compromised local account could be leveraged into full system compromise.

Affected Systems

PackageKit is widely deployed across the Linux ecosystem. Potentially affected distributions include:

  • Ubuntu (all recent LTS and interim releases using PackageKit with GNOME Software)
  • Fedora and RHEL-family distributions (DNF-backed PackageKit)
  • Debian and Debian-derivative distributions
  • openSUSE (using zypper-backed PackageKit)
  • Any distribution using PackageKit as a dependency for graphical software management

Server installations without graphical software centers may have PackageKit installed as a dependency of other management tools, making the attack surface broader than desktop-only systems.

Mitigation Steps

Until patches are available and applied, administrators can take several steps to reduce exposure:

Immediate mitigations:

  • Remove or disable PackageKit on systems where graphical software management is not required — server environments in particular rarely need it
    # Debian/Ubuntu
    sudo apt remove packagekit
     
    # Fedora/RHEL
    sudo dnf remove PackageKit
  • Restrict polkit rules to limit which users or groups can invoke PackageKit operations — edit /usr/share/polkit-1/rules.d/ to enforce stricter controls
  • Monitor PackageKit activity with auditd rules targeting the packagekitd process and unusual package installs/removals

Longer-term hardening:

  • Apply principle of least privilege on all Linux systems — users should not have any more access than their role requires
  • Deploy file integrity monitoring (FIM) to detect changes to system binaries and package databases
  • Enable SELinux or AppArmor policies that constrain what PackageKit can do even when running with elevated privileges
  • Audit polkit policy configurations regularly to ensure they haven't been weakened by package updates

Detection Guidance

Security teams should look for:

  • Unexpected package installations or removals outside of scheduled maintenance windows
  • PackageKit daemon activity on systems where no software center is in use
  • Packages installed by non-administrative user accounts (audit logs via auditd or journald)
  • New user accounts or SUID binaries appearing on the system

A SIEM rule that alerts on packagekitd spawning shell processes or writing to sensitive directories (/etc/passwd, /etc/shadow, /usr/bin) would help surface active exploitation.

Patch Status

Patches are expected from major distribution maintainers. Users should monitor their distribution's security advisories and apply updates promptly when available. Given the severity of root privilege escalation flaws, most distributions are expected to issue out-of-cycle security updates rather than waiting for the next scheduled patch cycle.

Sources

  • BleepingComputer — New 'Pack2TheRoot' flaw gives hackers root Linux access
#Vulnerability#Linux#Privilege Escalation#PackageKit#BleepingComputer

Related Articles

Over 10,000 Zimbra Servers Vulnerable to Ongoing XSS Attacks

CISA has confirmed that a cross-site scripting vulnerability in Zimbra Collaboration Suite is being actively exploited in the wild, with over 10,000 internet-exposed instances remaining unpatched and vulnerable to session hijacking, credential theft, and persistent account compromise.

5 min read

Hackers Actively Exploiting Breeze Cache File Upload Bug in WordPress Attacks

Threat actors are mass-exploiting a critical unauthenticated file upload vulnerability in the Breeze Cache WordPress plugin, uploading PHP webshells to gain full control of affected servers. The flaw, CVE-2026-3844, carries a CVSS score of 9.8 and requires no authentication to exploit.

5 min read

New Mirai Campaign Exploits RCE Flaw in End-of-Life D-Link Routers

A new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity command-injection vulnerability in end-of-life D-Link DIR-823X routers, enlisting unpatched devices into a botnet for DDoS attacks.

6 min read
Back to all News