Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-6019

Опубликовано: 17 июн. 2025
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

Отчет

While this vulnerability could allow a remote attacker to gain full control of the system, the default configuration of Red Hat offerings prevent such broad exploitation. Systems are at heightened risk if Policy Kit (polkit) were modified to allow remote users (for example SSH) to appear like regular local users. Due to the unlikely configuration required, the conditions to remotely exploit this vulnerability are typically not present, reducing the impact to Important.

Меры по смягчению последствий

Currently, no mitigation is available for this vulnerability.

Дополнительная информация

Статус:

Important
Дефект:
CWE-250
https://bugzilla.redhat.com/show_bug.cgi?id=2370051libblockdev: LPE from allow_active to root in libblockdev via udisks

EPSS

Процентиль: 2%
0.00013
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
около 2 месяцев назад

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

CVSS3: 7
nvd
около 2 месяцев назад

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

CVSS3: 7
debian
около 2 месяцев назад

A Local Privilege Escalation (LPE) vulnerability was found in libblock ...

suse-cvrf
около 2 месяцев назад

Security update for libblockdev

suse-cvrf
около 2 месяцев назад

Security update for libblockdev

EPSS

Процентиль: 2%
0.00013
Низкий

7 High

CVSS3