CVE Vulnerabilities

CVE-2025-6019

Execution with Unnecessary Privileges

Published: Jun 19, 2025 | Modified: Jul 10, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7 IMPORTANT
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
HIGH

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the allow_active setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an allow_active user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

Weakness

The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.

Affected Software

Name Vendor Start Version End Version
Red Hat Enterprise Linux 10 RedHat libblockdev-0:3.2.0-4.el10_0 *
Red Hat Enterprise Linux 7 Extended Lifecycle Support RedHat libblockdev-0:2.18-5.el7_9.1 *
Red Hat Enterprise Linux 8 RedHat libblockdev-0:2.28-7.el8_10 *
Red Hat Enterprise Linux 8.2 Advanced Update Support RedHat libblockdev-0:2.19-13.el8_2 *
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support RedHat libblockdev-0:2.24-6.el8_4 *
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support RedHat libblockdev-0:2.24-9.el8_6 *
Red Hat Enterprise Linux 8.6 Telecommunications Update Service RedHat libblockdev-0:2.24-9.el8_6 *
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions RedHat libblockdev-0:2.24-9.el8_6 *
Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions RedHat libblockdev-0:2.28-3.el8_8 *
Red Hat Enterprise Linux 9 RedHat libblockdev-0:2.28-14.el9_6 *
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions RedHat libblockdev-0:2.25-12.el9_0 *
Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions RedHat libblockdev-0:2.28-5.el9_2 *
Red Hat Enterprise Linux 9.4 Extended Update Support RedHat libblockdev-0:2.28-11.el9_4 *
Libblockdev Ubuntu esm-infra/bionic *
Libblockdev Ubuntu esm-infra/focal *
Libblockdev Ubuntu jammy *
Libblockdev Ubuntu noble *
Libblockdev Ubuntu oracular *
Libblockdev Ubuntu plucky *
Udisks2 Ubuntu devel *
Udisks2 Ubuntu esm-infra/bionic *
Udisks2 Ubuntu esm-infra/focal *
Udisks2 Ubuntu jammy *
Udisks2 Ubuntu noble *
Udisks2 Ubuntu oracular *
Udisks2 Ubuntu plucky *

Extended Description

New weaknesses can be exposed because running with extra privileges, such as root or Administrator, can disable the normal security checks being performed by the operating system or surrounding environment. Other pre-existing weaknesses can turn into security vulnerabilities if they occur while operating at raised privileges. Privilege management functions can behave in some less-than-obvious ways, and they have different quirks on different platforms. These inconsistencies are particularly pronounced if you are transitioning from one non-root user to another. Signal handlers and spawned processes run at the privilege of the owning process, so if a process is running as root when a signal fires or a sub-process is executed, the signal handler or sub-process will operate with root privileges.

Potential Mitigations

References