• Naich@lemmings.world
    link
    fedilink
    arrow-up
    35
    arrow-down
    2
    ·
    11 days ago

    It’s an LPE, and doesn’t allow full root access to anyone who isn’t already a user.

  • iAmTheTot@sh.itjust.works
    link
    fedilink
    arrow-up
    16
    ·
    11 days ago

    By chaining legitimate services such as udisks loop-mounts and PAM/environment quirks, attackers who own any active GUI or SSH session can vault across polkit’s allow_active trust zone and emerge as root in seconds.

    I recognize a few of those words.

    • ikidd@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      6
      ·
      11 days ago

      Basically it’s two vulns chained; first one gives a remote user privileges that a physically present user would get, in order to do things like put a thumbdrive in and have it mount. Then that udisks privilege can be subverted to escalate that level to root. So as long as you can start a remote session, you can pull root and it doesn’t even look that hard.

      • iAmTheTot@sh.itjust.works
        link
        fedilink
        arrow-up
        12
        arrow-down
        1
        ·
        edit-2
        11 days ago

        So how would a bad actor start a remote session on my Linux pc?

        Edited to add, downvoted for trying to learn is a new one for me.

        • rien333@lemmy.ml
          link
          fedilink
          arrow-up
          6
          ·
          11 days ago

          They probably can not. Unless you’ve setup your router such that anyone can connect to an ssh instance running on your PC, and then also use a bad password. Public wifi + having something like ssh running + having a bad password.

          Your PC probably doesn’t satisfy these requirements (yay!), but some servers might.

  • BioMyth@lemmy.ml
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    1
    ·
    11 days ago

    While this is a risk, it is only a real risk if the system is already exploited for regular user access. Or if there is an untrustworthy user of the system. So for most, it is not a major concern.

  • nyan@sh.itjust.works
    link
    fedilink
    arrow-up
    1
    ·
    11 days ago

    Or ditch udisks in favour of pmount (or udevil?), which shouldn’t be affected as far as I can tell. That will get you a few months’ grace before a similar problem pops up there.

  • theshatterstone54@feddit.uk
    link
    fedilink
    arrow-up
    2
    arrow-down
    6
    ·
    edit-2
    11 days ago

    Can this be used to root Android phones?

    If yes, it can be useful. If not, it’s potentially problematic