• iAmTheTot@sh.itjust.works
    link
    fedilink
    arrow-up
    1
    ·
    6 months ago

    By chaining legitimate services such as udisks loop-mounts and PAM/environment quirks, attackers who own any active GUI or SSH session can vault across polkit’s allow_active trust zone and emerge as root in seconds.

    I recognize a few of those words.

  • sunzu2@thebrainbin.orgBanned from community
    link
    fedilink
    arrow-up
    0
    ·
    6 months ago

    Is it new or is it newly discovered?

    Since it is open source… I guess we can rule out an intentional back door.

    • MyNameIsRichard@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      6 months ago

      Since it is open source… I guess we can rule out an intentional back door.

      Well, once upon a time I would have agreed with you but the xz backdoor changed my mind on that.

  • theshatterstone54@feddit.uk
    link
    fedilink
    arrow-up
    0
    arrow-down
    2
    ·
    edit-2
    6 months ago

    Can this be used to root Android phones?

    If yes, it can be useful. If not, it’s potentially problematic