52
submitted 1 month ago by [email protected] to c/[email protected]
top 6 comments
sorted by: hot top new old
[-] [email protected] 4 points 1 month ago
[-] [email protected] 9 points 1 month ago* (last edited 1 month ago)

That is a setup guide for hardware key and passkey auth. It is not a hardening guide, and does nothing to mitigate these LPE vulns.

[-] [email protected] 7 points 1 month ago

Thank you. That's what I wanted to know.

[-] [email protected] 2 points 1 month ago

This is said in the article:

To mitigate the risk posed by these flaws, it's essential to apply patches provided by the Linux distribution vendors. As temporary workarounds, users can modify the Polkit rule for "org.freedesktop.udisks2.modify-device" to require administrator authentication ("auth_admin").

[-] [email protected] 4 points 1 month ago* (last edited 1 month ago)

Yeah... Can you tell me where to change this? This article is not very clear, who, where or what... I'm running headless Debian 12 and can't even find any variable related to org.freedesktop.udisks2.modify-device or any polkit rule in /etc/polkit-1/rules.d/.... and not even a PolicyKit package installed on my system (polkit?)...

The only thing that comes close is /usr/share/polkit-1/...


Edit:

I guess this is a wrong assumption:

udisks ships by default on almost all Linux distributions

udisks2 is not even installed by default on my debian 12 system.

[-] [email protected] 2 points 1 month ago

Oof massive cve. It was disclosed so I'm assuming its already patched?

this post was submitted on 19 Jun 2025
52 points (94.8% liked)

Linux

8546 readers
747 users here now

A community for everything relating to the GNU/Linux operating system (except the memes!)

Also, check out:

Original icon base courtesy of [email protected] and The GIMP

founded 2 years ago
MODERATORS