MGASA-2025-0188

Source
https://advisories.mageia.org/MGASA-2025-0188.html
Import Source
https://advisories.mageia.org/MGASA-2025-0188.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2025-0188
Related
Published
2025-06-24T20:11:57Z
Modified
2025-06-24T19:29:09Z
Summary
Updated udisks2 & libblockdev packages fix security vulnerabilities
Details

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allowactive" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allowactive" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

References
Credits

Affected packages

Mageia:9 / udisks2

Package

Name
udisks2
Purl
pkg:rpm/mageia/udisks2?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10.1-1.1.mga9

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / libblockdev

Package

Name
libblockdev
Purl
pkg:rpm/mageia/libblockdev?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.1-1.mga9

Ecosystem specific

{
    "section": "core"
}