Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-9878

Опубликовано: 30 июн. 2025
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2025-9878: libblockdev security update (IMPORTANT)

[2.28-7.0.1]

  • enable btrfs support [Orabug: 30792917]

[2.28-7]

  • Don't allow suid and dev set on fs resize (CVE-2025-6019) Resolves: RHEL-96034

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

libblockdev-crypto-devel

2.28-7.0.1.el8_10

libblockdev-devel

2.28-7.0.1.el8_10

libblockdev-fs-devel

2.28-7.0.1.el8_10

libblockdev-loop-devel

2.28-7.0.1.el8_10

libblockdev-lvm-devel

2.28-7.0.1.el8_10

libblockdev-mdraid-devel

2.28-7.0.1.el8_10

libblockdev-part-devel

2.28-7.0.1.el8_10

libblockdev-swap-devel

2.28-7.0.1.el8_10

libblockdev-utils-devel

2.28-7.0.1.el8_10

libblockdev-vdo-devel

2.28-7.0.1.el8_10

libblockdev

2.28-7.0.1.el8_10

libblockdev-btrfs

2.28-7.0.1.el8_10

libblockdev-crypto

2.28-7.0.1.el8_10

libblockdev-dm

2.28-7.0.1.el8_10

libblockdev-fs

2.28-7.0.1.el8_10

libblockdev-kbd

2.28-7.0.1.el8_10

libblockdev-loop

2.28-7.0.1.el8_10

libblockdev-lvm

2.28-7.0.1.el8_10

libblockdev-lvm-dbus

2.28-7.0.1.el8_10

libblockdev-mdraid

2.28-7.0.1.el8_10

libblockdev-mpath

2.28-7.0.1.el8_10

libblockdev-nvdimm

2.28-7.0.1.el8_10

libblockdev-part

2.28-7.0.1.el8_10

libblockdev-plugins-all

2.28-7.0.1.el8_10

libblockdev-swap

2.28-7.0.1.el8_10

libblockdev-utils

2.28-7.0.1.el8_10

libblockdev-vdo

2.28-7.0.1.el8_10

python3-blockdev

2.28-7.0.1.el8_10

Oracle Linux x86_64

libblockdev-crypto-devel

2.28-7.0.1.el8_10

libblockdev-devel

2.28-7.0.1.el8_10

libblockdev-fs-devel

2.28-7.0.1.el8_10

libblockdev-loop-devel

2.28-7.0.1.el8_10

libblockdev-lvm-devel

2.28-7.0.1.el8_10

libblockdev-mdraid-devel

2.28-7.0.1.el8_10

libblockdev-part-devel

2.28-7.0.1.el8_10

libblockdev-swap-devel

2.28-7.0.1.el8_10

libblockdev-utils-devel

2.28-7.0.1.el8_10

libblockdev-vdo-devel

2.28-7.0.1.el8_10

libblockdev

2.28-7.0.1.el8_10

libblockdev-btrfs

2.28-7.0.1.el8_10

libblockdev-crypto

2.28-7.0.1.el8_10

libblockdev-dm

2.28-7.0.1.el8_10

libblockdev-fs

2.28-7.0.1.el8_10

libblockdev-kbd

2.28-7.0.1.el8_10

libblockdev-loop

2.28-7.0.1.el8_10

libblockdev-lvm

2.28-7.0.1.el8_10

libblockdev-lvm-dbus

2.28-7.0.1.el8_10

libblockdev-mdraid

2.28-7.0.1.el8_10

libblockdev-mpath

2.28-7.0.1.el8_10

libblockdev-nvdimm

2.28-7.0.1.el8_10

libblockdev-part

2.28-7.0.1.el8_10

libblockdev-plugins-all

2.28-7.0.1.el8_10

libblockdev-swap

2.28-7.0.1.el8_10

libblockdev-utils

2.28-7.0.1.el8_10

libblockdev-vdo

2.28-7.0.1.el8_10

python3-blockdev

2.28-7.0.1.el8_10

Связанные CVE

Связанные уязвимости

CVSS3: 7
ubuntu
около 2 месяцев назад

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

CVSS3: 7
redhat
около 2 месяцев назад

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

CVSS3: 7
nvd
около 2 месяцев назад

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

CVSS3: 7
debian
около 2 месяцев назад

A Local Privilege Escalation (LPE) vulnerability was found in libblock ...

suse-cvrf
около 1 месяца назад

Security update for libblockdev