summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorChangqing Li <changqing.li@windriver.com>2025-07-03 14:39:18 +0800
committerArmin Kuster <akuster808@gmail.com>2025-07-06 19:23:22 -0400
commit14b3caec6a1544eb306cb60e510d7af717a3b030 (patch)
treebdc41d7c377481f34604403a13ea36585a5a1c95
parent32200384c737234abf5ef1bbd6825095298e589a (diff)
downloadmeta-openembedded-14b3caec6a1544eb306cb60e510d7af717a3b030.tar.gz
libblockdev: fix CVE-2025-6019
CVE-2025-6019: A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system. Refer: https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
-rw-r--r--meta-oe/recipes-extended/libblockdev/files/CVE-2025-6019.patch31
-rw-r--r--meta-oe/recipes-extended/libblockdev/libblockdev_3.2.1.bb1
2 files changed, 32 insertions, 0 deletions
diff --git a/meta-oe/recipes-extended/libblockdev/files/CVE-2025-6019.patch b/meta-oe/recipes-extended/libblockdev/files/CVE-2025-6019.patch
new file mode 100644
index 0000000000..2575578e77
--- /dev/null
+++ b/meta-oe/recipes-extended/libblockdev/files/CVE-2025-6019.patch
@@ -0,0 +1,31 @@
1From b2e9c16c726f62e500241617f8f3a03aa658fbe3 Mon Sep 17 00:00:00 2001
2From: Thomas Blume <Thomas.Blume@suse.com>
3Date: Fri, 16 May 2025 14:27:10 +0200
4Subject: [PATCH] Don't allow suid and dev set on fs resize
5
6Fixes: CVE-2025-6019
7
8CVE: CVE-2025-6019
9Upstream-Status: Backport [ https://github.com/storaged-project/libblockdev/commit/46b54414f66e965e3c37f8f51e621f96258ae22e ]
10
11Signed-off-by: Changqing Li <changqing.li@windriver.com>
12---
13 src/plugins/fs/generic.c | 2 +-
14 1 file changed, 1 insertion(+), 1 deletion(-)
15
16diff --git a/src/plugins/fs/generic.c b/src/plugins/fs/generic.c
17index 2b2180aa..60f7d75e 100644
18--- a/src/plugins/fs/generic.c
19+++ b/src/plugins/fs/generic.c
20@@ -661,7 +661,7 @@ static gchar* fs_mount (const gchar *device, gchar *fstype, gboolean read_only,
21 "Failed to create temporary directory for mounting '%s'.", device);
22 return NULL;
23 }
24- ret = bd_fs_mount (device, mountpoint, fstype, read_only ? "ro" : NULL, NULL, &l_error);
25+ ret = bd_fs_mount (device, mountpoint, fstype, read_only ? "nosuid,nodev,ro" : "nosuid,nodev", NULL, &l_error);
26 if (!ret) {
27 g_propagate_prefixed_error (error, l_error, "Failed to mount '%s': ", device);
28 g_rmdir (mountpoint);
29--
302.34.1
31
diff --git a/meta-oe/recipes-extended/libblockdev/libblockdev_3.2.1.bb b/meta-oe/recipes-extended/libblockdev/libblockdev_3.2.1.bb
index b98942379e..5ef88536d6 100644
--- a/meta-oe/recipes-extended/libblockdev/libblockdev_3.2.1.bb
+++ b/meta-oe/recipes-extended/libblockdev/libblockdev_3.2.1.bb
@@ -14,6 +14,7 @@ DEPENDS = "autoconf-archive-native glib-2.0 kmod udev libnvme"
14 14
15SRC_URI = "git://github.com/storaged-project/libblockdev;branch=3.2.x-branch;protocol=https \ 15SRC_URI = "git://github.com/storaged-project/libblockdev;branch=3.2.x-branch;protocol=https \
16 file://0001-fix-pythondir-for-multilib-when-cross-compiling.patch \ 16 file://0001-fix-pythondir-for-multilib-when-cross-compiling.patch \
17 file://CVE-2025-6019.patch \
17 " 18 "
18SRCREV = "b829b60d9ff049abb190f09a3b9a5fac648cd5a3" 19SRCREV = "b829b60d9ff049abb190f09a3b9a5fac648cd5a3"
19S = "${WORKDIR}/git" 20S = "${WORKDIR}/git"