CVE-2025-6019

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation.  However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
redhatCNA
7 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 1%
Debian logo
Debian Releases
Debian Product
Codename
libblockdev
bullseye
vulnerable
bullseye (security)
2.25-2+deb11u1
fixed
bookworm
vulnerable
bookworm (security)
2.28-2+deb12u1
fixed
sid
3.3.0-2.1
fixed
trixie
3.3.0-2.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libblockdev
plucky
Fixed 3.3.0-2ubuntu0.1
released
oracular
Fixed 3.1.1-2ubuntu0.1
released
noble
Fixed 3.1.1-1ubuntu0.1
released
jammy
Fixed 2.26-1ubuntu0.1
released
focal
Fixed 2.23-2ubuntu3+esm1
released
bionic
Fixed 2.16-2ubuntu0.1~esm1
released
udisks2
plucky
Fixed 2.10.1-11ubuntu2.2
released
oracular
Fixed 2.10.1-9ubuntu3.2
released
noble
Fixed 2.10.1-6ubuntu1.2
released
jammy
Fixed 2.9.4-1ubuntu2.2
released
focal
Fixed 2.8.4-1ubuntu2+esm1
released
bionic
Fixed 2.7.6-3ubuntu0.2+esm1
released
xenial
needs-triage
trusty
needs-triage