Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-64187.json
JSON Data
https://api.osv.dev/v1/vulns/AZL-64187
Upstream
Published
2025-06-19T12:15:19Z
Modified
2026-04-21T04:32:19.471554Z
Summary
CVE-2025-6019 affecting package libblockdev 2.28-3
Details

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allowactive" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allowactive" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

References

Affected packages

Azure Linux:2 / libblockdev

Package

Name
libblockdev
Purl
pkg:rpm/azure-linux/libblockdev

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
2.28-3

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-64187.json"