Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-26104

Опубликовано: 25 фев. 2026
Источник: debian
EPSS Низкий

Описание

A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method responsible for exporting encryption metadata does not perform a policy check. As a result, sensitive cryptographic metadata can be read and written to attacker-controlled locations. This weakens the confidentiality guarantees of encrypted storage volumes.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
udisks2fixed2.11.1-1package
udisks2not-affectedtrixiepackage
udisks2not-affectedbookwormpackage
udisks2not-affectedbullseyepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2433717

  • https://github.com/storaged-project/udisks/security/advisories/GHSA-fcvx-497g-6xmw

  • Introduced with: https://github.com/storaged-project/udisks/commit/629bcce24a3c368d2ab1dfcb87f0ef23a7fdd1c5 (udisks-2.10.90)

  • Fixed by: https://github.com/storaged-project/udisks/commit/4353c0610089218ac4813edc05cc1662b7a9d6dd (udisks-2.11.1)

EPSS

Процентиль: 1%
0.00008
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 1 месяца назад

A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method responsible for exporting encryption metadata does not perform a policy check. As a result, sensitive cryptographic metadata can be read and written to attacker-controlled locations. This weakens the confidentiality guarantees of encrypted storage volumes.

CVSS3: 5.5
redhat
около 1 месяца назад

A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method responsible for exporting encryption metadata does not perform a policy check. As a result, sensitive cryptographic metadata can be read and written to attacker-controlled locations. This weakens the confidentiality guarantees of encrypted storage volumes.

CVSS3: 5.5
nvd
около 1 месяца назад

A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method responsible for exporting encryption metadata does not perform a policy check. As a result, sensitive cryptographic metadata can be read and written to attacker-controlled locations. This weakens the confidentiality guarantees of encrypted storage volumes.

CVSS3: 5.5
github
около 1 месяца назад

A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method responsible for exporting encryption metadata does not perform a policy check. As a result, sensitive cryptographic metadata can be read and written to attacker-controlled locations. This weakens the confidentiality guarantees of encrypted storage volumes.

rocky
23 дня назад

Important: udisks2 security update

EPSS

Процентиль: 1%
0.00008
Низкий