Polkit exploit?


DrPeril

Recommended Posts

pkexec doesn't exist in the standard OS itself, and the nice thing about containers is that you'd be pretty much safe since only files / folders you've given them access to would be able to take advantage of

 

Besides, this exploit is about running a particular dangerous command to then provide root level access for another non-root user.  In order to take advantage of this exploit, any hacker would first have to take advantage of another (or multiple) exploits in order to actually run a command in the first place.

 

All in all, you're probably safe, and most of the authors of the containers regularly update their containers to take advantage of any security updates.

  • Like 2
Link to comment

As an FYI to anyone out there who has pkexec/polkit installed on their distribution of linux (perhaps in a VM) that hasn't been patched that has multiple users that you don't know/trust, you can fix the SUID-bit to prevent the exploit by chmod of the file:

 

 

chmod 0755 /usr/bin/pkexec

 

This prevents it from running as root when executed by a non-privileged user.

  • Like 1
Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.