CVE-2026-26103

Source
https://cve.org/CVERecord?id=CVE-2026-26103
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26103.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-26103
Downstream
Published
2026-02-25T11:16:02.983Z
Modified
2026-02-28T08:06:17.687115Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unprivileged user to instruct the root-owned udisks daemon to overwrite encryption metadata on block devices. This can permanently invalidate encryption keys and render encrypted volumes inaccessible. Successful exploitation results in a denial-of-service condition through irreversible data loss.

References

Affected packages

Git / github.com/storaged-project/udisks

Affected ranges

Type
GIT
Repo
https://github.com/storaged-project/udisks
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

storaged-2.*
storaged-2.0.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26103.json"