one of the major reasons behind choosing Linux as an operating system is that it’s much much more protected than Windows. There are plenty of reasons for this including suitable user permissions, installing software from trusted sources and, of course, the fact that many software for Linux including the Linux kernel itself is open source which allows anybody to review the code for vulnerabilities. This doesn’t imply that Linux is perfectly protected though, as researchers recently found a major bug found in many major Linux distributions that allows anybody to run code as the root user.
The exploit is a memory corruption vulnerability in Polkit, a framework that handles the privilege level of various system processes. It specifically impacts the program pkexec. With the proof-of-concept exploit (file download warning) in hand, all an attacker needs to do to escalate themselves to root is to compile the program on the computer and run it as the default user. An example is shown by [Jim MacDonald] on Twitter for those not prepared to try this on their own machines.
As bad as this sounds, it seems as though all of the major distributions that this impacts have already released updates that patch the issue, including Debian, Ubuntu, Red Hat, Fedora, open SUSE, and Arch. There is also a short-term workaround that removes read/write consent from the pkexec program so it can’t run at all. That being said, it might be best to check that your Linux systems are all up-to-date and that no strangers have been typing random commands into the terminal recently.