Home / mailingsPDF  

[SECURITY] [DSA 5943-1] libblockdev security update

Posted on 17 June 2025
Debian Security Advisory

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5943-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
June 17, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libblockdev
CVE ID : CVE-2025-6019

The Qualys Threat Research Unit (TRU) discovered a local privilege
escalation vulnerability in libblockdev, a library for manipulating
block devices. An "allow_active" user can exploit this flaw via the
udisks daemon to obtain the full privileges of the root user.

Details can be found in the Qualys advisory at
https://www.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt

Along with the libblockdev update, updated udisks2 packages are
released, to enforce that private mounts are mounted with
'nodev,nosuid'.

For the stable distribution (bookworm), this problem has been fixed in
version 2.28-2+deb12u1. The additional udisks2 hardening is applied in
version 2.9.4-4+deb12u1.

We recommend that you upgrade your libblockdev packages.

For the detailed security status of libblockdev please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/libblockdev

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

 

TOP