CVE-2025-6019
📋 TL;DR
A Local Privilege Escalation vulnerability in libblockdev allows physically present users with 'allow_active' Polkit permissions to escalate to root privileges. Attackers can create malicious XFS images with SUID-root shells, trick udisks into resizing them, and gain complete system control. This affects systems using libblockdev with udisks and Polkit's allow_active configuration.
💻 Affected Systems
- libblockdev
- udisks
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with root access, allowing attacker to install persistent backdoors, steal all data, and disable security controls.
Likely Case
Local attacker gains root privileges on the target system, enabling privilege escalation from limited user to full administrative control.
If Mitigated
Limited impact if proper Polkit restrictions are in place and udisks security flags are enforced correctly.
🎯 Exploit Status
Requires local access, Polkit allow_active permissions, and ability to create/mount filesystem images. Exploit involves multiple steps including creating malicious XFS image and triggering udisks resize operation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches available via RHSA-2025:10796, RHSA-2025:9320, RHSA-2025:9321, RHSA-2025:9322, RHSA-2025:9323
Vendor Advisory: https://access.redhat.com/errata/RHSA-2025:10796
Restart Required: No
Instructions:
1. Update libblockdev packages using your distribution's package manager. 2. For RHEL systems: 'sudo yum update libblockdev' or 'sudo dnf update libblockdev'. 3. Verify udisks is also updated if required by your distribution.
🔧 Temporary Workarounds
Restrict Polkit allow_active permissions
linuxLimit or remove allow_active permissions for physically present users to prevent exploitation.
sudo nano /etc/polkit-1/rules.d/50-default.rules
Add restrictions to allow_active rules
Disable automatic mounting of filesystem images
linuxPrevent udisks from automatically mounting user-provided filesystem images.
sudo systemctl mask udisks2.service
sudo systemctl stop udisks2.service
🧯 If You Can't Patch
- Restrict physical access to systems and implement strict Polkit policy controls
- Monitor for suspicious filesystem mounting operations and SUID file creation
🔍 How to Verify
Check if Vulnerable:
Check libblockdev version: 'rpm -q libblockdev' or 'dpkg -l | grep libblockdev'. Compare against patched versions in Red Hat advisories.
Check Version:
rpm -q libblockdev --queryformat '%{VERSION}-%{RELEASE}\n'
Verify Fix Applied:
Verify libblockdev package version matches patched version from vendor advisories and test that malicious XFS images cannot be mounted with SUID privileges.
📡 Detection & Monitoring
Log Indicators:
- Unexpected udisks resize operations
- Mounting of user-created XFS images
- Creation of SUID-root files in mounted filesystems
Network Indicators:
- None - this is a local attack
SIEM Query:
source="audit.log" AND (event="MOUNT" OR event="RESIZE") AND image="*.xfs" OR process="udisksd" AND action="mount"
🔗 References
- https://access.redhat.com/errata/RHSA-2025:10796
- https://access.redhat.com/errata/RHSA-2025:9320
- https://access.redhat.com/errata/RHSA-2025:9321
- https://access.redhat.com/errata/RHSA-2025:9322
- https://access.redhat.com/errata/RHSA-2025:9323
- https://access.redhat.com/errata/RHSA-2025:9324
- https://access.redhat.com/errata/RHSA-2025:9325
- https://access.redhat.com/errata/RHSA-2025:9326
- https://access.redhat.com/errata/RHSA-2025:9327
- https://access.redhat.com/errata/RHSA-2025:9328
- https://access.redhat.com/errata/RHSA-2025:9878
- https://access.redhat.com/security/cve/CVE-2025-6019
- https://bugzilla.redhat.com/show_bug.cgi?id=2370051
- https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt
- http://www.openwall.com/lists/oss-security/2025/06/17/5
- http://www.openwall.com/lists/oss-security/2025/06/17/6
- http://www.openwall.com/lists/oss-security/2025/06/18/1
- https://lists.debian.org/debian-lts-announce/2025/06/msg00018.html
- https://news.ycombinator.com/item?id=44325861
- https://www.bleepingcomputer.com/news/linux/new-linux-udisks-flaw-lets-attackers-get-root-on-major-linux-distros/