mirror of
git://git.openembedded.org/meta-openembedded
synced 2026-04-02 02:49:12 +00:00
libblockdev: fix CVE-2025-6019
CVE-2025-6019: A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system. Refer: https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
This commit is contained in:
parent
7f20709055
commit
d2054d5887
@ -0,0 +1,31 @@
|
||||
From b2e9c16c726f62e500241617f8f3a03aa658fbe3 Mon Sep 17 00:00:00 2001
|
||||
From: Thomas Blume <Thomas.Blume@suse.com>
|
||||
Date: Fri, 16 May 2025 14:27:10 +0200
|
||||
Subject: [PATCH] Don't allow suid and dev set on fs resize
|
||||
|
||||
Fixes: CVE-2025-6019
|
||||
|
||||
CVE: CVE-2025-6019
|
||||
Upstream-Status: Backport [ https://github.com/storaged-project/libblockdev/commit/46b54414f66e965e3c37f8f51e621f96258ae22e ]
|
||||
|
||||
Signed-off-by: Changqing Li <changqing.li@windriver.com>
|
||||
---
|
||||
src/plugins/fs/generic.c | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/src/plugins/fs/generic.c b/src/plugins/fs/generic.c
|
||||
index 2b2180aa..60f7d75e 100644
|
||||
--- a/src/plugins/fs/generic.c
|
||||
+++ b/src/plugins/fs/generic.c
|
||||
@@ -661,7 +661,7 @@ static gchar* fs_mount (const gchar *device, gchar *fstype, gboolean read_only,
|
||||
"Failed to create temporary directory for mounting '%s'.", device);
|
||||
return NULL;
|
||||
}
|
||||
- ret = bd_fs_mount (device, mountpoint, fstype, read_only ? "ro" : NULL, NULL, &l_error);
|
||||
+ ret = bd_fs_mount (device, mountpoint, fstype, read_only ? "nosuid,nodev,ro" : "nosuid,nodev", NULL, &l_error);
|
||||
if (!ret) {
|
||||
g_propagate_prefixed_error (error, l_error, "Failed to mount '%s': ", device);
|
||||
g_rmdir (mountpoint);
|
||||
--
|
||||
2.34.1
|
||||
|
||||
@ -14,6 +14,7 @@ DEPENDS = "autoconf-archive-native glib-2.0 kmod udev libnvme"
|
||||
|
||||
SRC_URI = "git://github.com/storaged-project/libblockdev;branch=3.1.x-devel;protocol=https \
|
||||
file://0001-fix-pythondir-for-multilib-when-cross-compiling.patch \
|
||||
file://CVE-2025-6019.patch \
|
||||
"
|
||||
SRCREV = "68aaff5556afe26be749c29a2b7cbd714dce3050"
|
||||
S = "${WORKDIR}/git"
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user