Jump to content

Polkit exploit?


DrPeril

Recommended Posts

pkexec doesn't exist in the standard OS itself, and the nice thing about containers is that you'd be pretty much safe since only files / folders you've given them access to would be able to take advantage of

 

Besides, this exploit is about running a particular dangerous command to then provide root level access for another non-root user.  In order to take advantage of this exploit, any hacker would first have to take advantage of another (or multiple) exploits in order to actually run a command in the first place.

 

All in all, you're probably safe, and most of the authors of the containers regularly update their containers to take advantage of any security updates.

  • Like 2
Link to comment

As an FYI to anyone out there who has pkexec/polkit installed on their distribution of linux (perhaps in a VM) that hasn't been patched that has multiple users that you don't know/trust, you can fix the SUID-bit to prevent the exploit by chmod of the file:

 

 

chmod 0755 /usr/bin/pkexec

 

This prevents it from running as root when executed by a non-privileged user.

  • Like 1
Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...