Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-9327

Опубликовано: 23 июн. 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-9327: libblockdev security update (IMPORTANT)

[2.28-14.0.1]

  • enable btrfs support [Orabug: 30792917]

[2.28-14]

  • Don't allow suid and dev set on fs resize (CVE-2025-6019) Resolves: RHEL-96038

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

libblockdev

2.28-14.0.1.el9_6

libblockdev-btrfs

2.28-14.0.1.el9_6

libblockdev-crypto

2.28-14.0.1.el9_6

libblockdev-dm

2.28-14.0.1.el9_6

libblockdev-fs

2.28-14.0.1.el9_6

libblockdev-kbd

2.28-14.0.1.el9_6

libblockdev-loop

2.28-14.0.1.el9_6

libblockdev-lvm

2.28-14.0.1.el9_6

libblockdev-lvm-dbus

2.28-14.0.1.el9_6

libblockdev-mdraid

2.28-14.0.1.el9_6

libblockdev-mpath

2.28-14.0.1.el9_6

libblockdev-nvdimm

2.28-14.0.1.el9_6

libblockdev-nvme

2.28-14.0.1.el9_6

libblockdev-part

2.28-14.0.1.el9_6

libblockdev-plugins-all

2.28-14.0.1.el9_6

libblockdev-swap

2.28-14.0.1.el9_6

libblockdev-tools

2.28-14.0.1.el9_6

libblockdev-utils

2.28-14.0.1.el9_6

python3-blockdev

2.28-14.0.1.el9_6

Oracle Linux x86_64

libblockdev

2.28-14.0.1.el9_6

libblockdev-btrfs

2.28-14.0.1.el9_6

libblockdev-crypto

2.28-14.0.1.el9_6

libblockdev-dm

2.28-14.0.1.el9_6

libblockdev-fs

2.28-14.0.1.el9_6

libblockdev-kbd

2.28-14.0.1.el9_6

libblockdev-loop

2.28-14.0.1.el9_6

libblockdev-lvm

2.28-14.0.1.el9_6

libblockdev-lvm-dbus

2.28-14.0.1.el9_6

libblockdev-mdraid

2.28-14.0.1.el9_6

libblockdev-mpath

2.28-14.0.1.el9_6

libblockdev-nvdimm

2.28-14.0.1.el9_6

libblockdev-nvme

2.28-14.0.1.el9_6

libblockdev-part

2.28-14.0.1.el9_6

libblockdev-plugins-all

2.28-14.0.1.el9_6

libblockdev-swap

2.28-14.0.1.el9_6

libblockdev-tools

2.28-14.0.1.el9_6

libblockdev-utils

2.28-14.0.1.el9_6

python3-blockdev

2.28-14.0.1.el9_6

Связанные CVE

Связанные уязвимости

CVSS3: 7
ubuntu
около 2 месяцев назад

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

CVSS3: 7
redhat
около 2 месяцев назад

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

CVSS3: 7
nvd
около 2 месяцев назад

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

CVSS3: 7
debian
около 2 месяцев назад

A Local Privilege Escalation (LPE) vulnerability was found in libblock ...

suse-cvrf
около 2 месяцев назад

Security update for libblockdev