• ikidd@lemmy.worldOP
    link
    fedilink
    English
    arrow-up
    6
    ·
    12 days ago

    Basically it’s two vulns chained; first one gives a remote user privileges that a physically present user would get, in order to do things like put a thumbdrive in and have it mount. Then that udisks privilege can be subverted to escalate that level to root. So as long as you can start a remote session, you can pull root and it doesn’t even look that hard.

    • iAmTheTot@sh.itjust.works
      link
      fedilink
      arrow-up
      12
      arrow-down
      1
      ·
      edit-2
      12 days ago

      So how would a bad actor start a remote session on my Linux pc?

      Edited to add, downvoted for trying to learn is a new one for me.

      • rien333@lemmy.ml
        link
        fedilink
        arrow-up
        6
        ·
        12 days ago

        They probably can not. Unless you’ve setup your router such that anyone can connect to an ssh instance running on your PC, and then also use a bad password. Public wifi + having something like ssh running + having a bad password.

        Your PC probably doesn’t satisfy these requirements (yay!), but some servers might.