To mitigate the risk posed by these flaws, it’s essential to apply patches provided by the Linux distribution vendors. As temporary workarounds, users can modify the Polkit rule for “org.freedesktop.udisks2.modify-device” to require administrator authentication (“auth_admin”).
Yeah… Can you tell me where to change this? This article is not very clear, who, where or what… I’m running headless Debian 12 and can’t even find any variable related to org.freedesktop.udisks2.modify-device or any polkit rule in /etc/polkit-1/rules.d/.... and not even a PolicyKit package installed on my system (polkit?)…
The only thing that comes close is /usr/share/polkit-1/...
Edit:
I guess this is a wrong assumption:
udisks ships bydefaulton almost all Linux distributions
udisks2 is not even installed by default on my debian 12 system.
Would implementing something like this prevent this problem?
https://discussion.fedoraproject.org/t/securing-fedora-with-fido2-utrust-full-disk-luks-gui-login-and-sudo-authentication/154136
That is a setup guide for hardware key and passkey auth. It is not a hardening guide, and does nothing to mitigate these LPE vulns.
Thank you. That’s what I wanted to know.
This is said in the article:
Yeah… Can you tell me where to change this? This article is not very clear, who, where or what… I’m running headless Debian 12 and can’t even find any variable related to
org.freedesktop.udisks2.modify-device
or any polkit rule in/etc/polkit-1/rules.d/....
and not even a PolicyKit package installed on my system (polkit?)…The only thing that comes close is
/usr/share/polkit-1/...
Edit:
I guess this is a wrong assumption:
udisks ships by default on almost all Linux distributions
udisks2 is not even installed by default on my debian 12 system.