vulnerability

Rocky Linux: CVE-2025-6019: libblockdev (Multiple Advisories)

Severity
7
CVSS
(AV:L/AC:M/Au:S/C:C/I:C/A:C)
Published
Jul 29, 2025
Added
Jul 31, 2025
Modified
Nov 25, 2025

Description

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

Solutions

rocky-upgrade-libblockdevrocky-upgrade-libblockdev-cryptorocky-upgrade-libblockdev-crypto-debuginforocky-upgrade-libblockdev-crypto-develrocky-upgrade-libblockdev-debuginforocky-upgrade-libblockdev-debugsourcerocky-upgrade-libblockdev-develrocky-upgrade-libblockdev-dmrocky-upgrade-libblockdev-dm-debuginforocky-upgrade-libblockdev-fsrocky-upgrade-libblockdev-fs-debuginforocky-upgrade-libblockdev-fs-develrocky-upgrade-libblockdev-kbdrocky-upgrade-libblockdev-kbd-debuginforocky-upgrade-libblockdev-looprocky-upgrade-libblockdev-loop-debuginforocky-upgrade-libblockdev-loop-develrocky-upgrade-libblockdev-lvmrocky-upgrade-libblockdev-lvm-dbusrocky-upgrade-libblockdev-lvm-dbus-debuginforocky-upgrade-libblockdev-lvm-debuginforocky-upgrade-libblockdev-lvm-develrocky-upgrade-libblockdev-mdraidrocky-upgrade-libblockdev-mdraid-debuginforocky-upgrade-libblockdev-mdraid-develrocky-upgrade-libblockdev-mpathrocky-upgrade-libblockdev-mpath-debuginforocky-upgrade-libblockdev-nvdimmrocky-upgrade-libblockdev-nvdimm-debuginforocky-upgrade-libblockdev-nvmerocky-upgrade-libblockdev-nvme-debuginforocky-upgrade-libblockdev-partrocky-upgrade-libblockdev-part-debuginforocky-upgrade-libblockdev-part-develrocky-upgrade-libblockdev-plugins-allrocky-upgrade-libblockdev-s390rocky-upgrade-libblockdev-s390-debuginforocky-upgrade-libblockdev-smartrocky-upgrade-libblockdev-smart-debuginforocky-upgrade-libblockdev-smartmontoolsrocky-upgrade-libblockdev-smartmontools-debuginforocky-upgrade-libblockdev-swaprocky-upgrade-libblockdev-swap-debuginforocky-upgrade-libblockdev-swap-develrocky-upgrade-libblockdev-toolsrocky-upgrade-libblockdev-tools-debuginforocky-upgrade-libblockdev-utilsrocky-upgrade-libblockdev-utils-debuginforocky-upgrade-libblockdev-utils-develrocky-upgrade-libblockdev-vdorocky-upgrade-libblockdev-vdo-debuginforocky-upgrade-libblockdev-vdo-develrocky-upgrade-python3-blockdev
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.