• iAmTheTot@sh.itjust.works
    link
    fedilink
    arrow-up
    1
    ·
    6 months ago

    By chaining legitimate services such as udisks loop-mounts and PAM/environment quirks, attackers who own any active GUI or SSH session can vault across polkit’s allow_active trust zone and emerge as root in seconds.

    I recognize a few of those words.