CVE-2025-6019

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.
Configurations

No configuration.

History

30 Jun 2025, 03:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:9878 -

23 Jun 2025, 14:15

Type Values Removed Values Added
References
  • () https://news.ycombinator.com/item?id=44325861 -
  • () https://www.bleepingcomputer.com/news/linux/new-linux-udisks-flaw-lets-attackers-get-root-on-major-linux-distros/ -

23 Jun 2025, 07:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:9320 -
  • () https://access.redhat.com/errata/RHSA-2025:9321 -
  • () https://access.redhat.com/errata/RHSA-2025:9322 -
  • () https://access.redhat.com/errata/RHSA-2025:9323 -
  • () https://access.redhat.com/errata/RHSA-2025:9324 -
  • () https://access.redhat.com/errata/RHSA-2025:9325 -
  • () https://access.redhat.com/errata/RHSA-2025:9326 -
  • () https://access.redhat.com/errata/RHSA-2025:9327 -
  • () https://access.redhat.com/errata/RHSA-2025:9328 -
  • () https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt -
References
  • () https://access.redhat.com/errata/RHSA-2025:9320 -
  • () https://access.redhat.com/errata/RHSA-2025:9321 -
  • () https://access.redhat.com/errata/RHSA-2025:9322 -
  • () https://access.redhat.com/errata/RHSA-2025:9323 -
  • () https://access.redhat.com/errata/RHSA-2025:9324 -
  • () https://access.redhat.com/errata/RHSA-2025:9325 -
  • () https://access.redhat.com/errata/RHSA-2025:9326 -
  • () https://access.redhat.com/errata/RHSA-2025:9327 -
  • () https://access.redhat.com/errata/RHSA-2025:9328 -
  • () https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt -
References
  • () https://access.redhat.com/errata/RHSA-2025:9320 -
  • () https://access.redhat.com/errata/RHSA-2025:9321 -
  • () https://access.redhat.com/errata/RHSA-2025:9322 -
  • () https://access.redhat.com/errata/RHSA-2025:9323 -
  • () https://access.redhat.com/errata/RHSA-2025:9324 -
  • () https://access.redhat.com/errata/RHSA-2025:9325 -
  • () https://access.redhat.com/errata/RHSA-2025:9326 -
  • () https://access.redhat.com/errata/RHSA-2025:9327 -
  • () https://access.redhat.com/errata/RHSA-2025:9328 -
  • () https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt -

21 Jun 2025, 23:15

Type Values Removed Values Added
References
  • () https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt -
Summary
  • (es) Se encontró una vulnerabilidad de Escalada de Privilegios Locales (LPE) en libblockdev. Generalmente, la configuración "allow_active" de Polkit permite a un usuario físicamente presente realizar ciertas acciones según el tipo de sesión. Debido a la forma en que libblockdev interactúa con el daemon udisks, un usuario "allow_active" en un sistema puede escalar a privilegios de root completos en el host objetivo. Normalmente, udisks monta imágenes del sistema de archivos proporcionadas por el usuario con indicadores de seguridad como nosuid y nodev para evitar la escalada de privilegios. Sin embargo, un atacante local puede crear una imagen XFS especialmente manipulada que contenga un shell SUID-root y luego engañar a udisks para que la redimensione. Esto monta su sistema de archivos malicioso con privilegios de root, lo que le permite ejecutar su shell SUID-root y obtener el control total del sistema.
References
  • () https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt -

19 Jun 2025, 12:15

Type Values Removed Values Added
References
  • {'url': 'https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt', 'source': 'secalert@redhat.com'}
References
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9320', 'source': 'secalert@redhat.com'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9321', 'source': 'secalert@redhat.com'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9322', 'source': 'secalert@redhat.com'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9323', 'source': 'secalert@redhat.com'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9324', 'source': 'secalert@redhat.com'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9325', 'source': 'secalert@redhat.com'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9326', 'source': 'secalert@redhat.com'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9327', 'source': 'secalert@redhat.com'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9328', 'source': 'secalert@redhat.com'}
  • {'url': 'https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt', 'source': 'secalert@redhat.com'}
New CVE
References
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9320', 'source': 'secalert@redhat.com'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9321', 'source': 'secalert@redhat.com'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9322', 'source': 'secalert@redhat.com'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9323', 'source': 'secalert@redhat.com'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9324', 'source': 'secalert@redhat.com'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9325', 'source': 'secalert@redhat.com'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9326', 'source': 'secalert@redhat.com'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9327', 'source': 'secalert@redhat.com'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2025:9328', 'source': 'secalert@redhat.com'}
  • {'url': 'https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt', 'source': 'secalert@redhat.com'}
References
  • {'url': 'https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt', 'source': 'secalert@redhat.com'}

Information

Published : 2025-06-19 12:15

Updated : 2025-06-30 03:15


NVD link : CVE-2025-6019

Mitre link : CVE-2025-6019

CVE.ORG link : CVE-2025-6019


JSON object : View

Products Affected

No product.

CWE
CWE-250

Execution with Unnecessary Privileges