• iAmTheTot@sh.itjust.works
    link
    fedilink
    arrow-up
    16
    ·
    12 days ago

    By chaining legitimate services such as udisks loop-mounts and PAM/environment quirks, attackers who own any active GUI or SSH session can vault across polkit’s allow_active trust zone and emerge as root in seconds.

    I recognize a few of those words.

    • ikidd@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      6
      ·
      12 days ago

      Basically it’s two vulns chained; first one gives a remote user privileges that a physically present user would get, in order to do things like put a thumbdrive in and have it mount. Then that udisks privilege can be subverted to escalate that level to root. So as long as you can start a remote session, you can pull root and it doesn’t even look that hard.

      • iAmTheTot@sh.itjust.works
        link
        fedilink
        arrow-up
        12
        arrow-down
        1
        ·
        edit-2
        11 days ago

        So how would a bad actor start a remote session on my Linux pc?

        Edited to add, downvoted for trying to learn is a new one for me.

        • rien333@lemmy.ml
          link
          fedilink
          arrow-up
          6
          ·
          12 days ago

          They probably can not. Unless you’ve setup your router such that anyone can connect to an ssh instance running on your PC, and then also use a bad password. Public wifi + having something like ssh running + having a bad password.

          Your PC probably doesn’t satisfy these requirements (yay!), but some servers might.