summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorChangqing Li <changqing.li@windriver.com>2025-07-03 19:03:28 +0800
committerArmin Kuster <akuster808@gmail.com>2025-07-13 14:35:44 -0400
commite73af91ee37e49fe8beea0a25bf703d05ed4be18 (patch)
tree9d5fd48a03a7df441668c2cdf984bc8d5999a43f
parent058249f9a836e3aa866436aa6e37d6d48ff768fd (diff)
downloadmeta-openembedded-e73af91ee37e49fe8beea0a25bf703d05ed4be18.tar.gz
libblockdev: fix CVE-2025-6019
CVE-2025-6019: A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system. Refer: https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
-rw-r--r--meta-oe/recipes-extended/libblockdev/files/CVE-2025-6019.patch31
-rw-r--r--meta-oe/recipes-extended/libblockdev/libblockdev_2.26.bb1
2 files changed, 32 insertions, 0 deletions
diff --git a/meta-oe/recipes-extended/libblockdev/files/CVE-2025-6019.patch b/meta-oe/recipes-extended/libblockdev/files/CVE-2025-6019.patch
new file mode 100644
index 0000000000..4bca3f7564
--- /dev/null
+++ b/meta-oe/recipes-extended/libblockdev/files/CVE-2025-6019.patch
@@ -0,0 +1,31 @@
1From d92467589216059aff46f545a7c3eba594103ee3 Mon Sep 17 00:00:00 2001
2From: Thomas Blume <Thomas.Blume@suse.com>
3Date: Fri, 16 May 2025 14:27:10 +0200
4Subject: [PATCH] Don't allow suid and dev set on fs resize
5
6Fixes: CVE-2025-6019
7
8CVE: CVE-2025-6019
9Upstream-Status: Backport [ https://github.com/storaged-project/libblockdev/commit/46b54414f66e965e3c37f8f51e621f96258ae22e ]
10
11Signed-off-by: Changqing Li <changqing.li@windriver.com>
12---
13 src/plugins/fs/generic.c | 2 +-
14 1 file changed, 1 insertion(+), 1 deletion(-)
15
16diff --git a/src/plugins/fs/generic.c b/src/plugins/fs/generic.c
17index eb6b5567..86051391 100644
18--- a/src/plugins/fs/generic.c
19+++ b/src/plugins/fs/generic.c
20@@ -409,7 +409,7 @@ static gboolean xfs_resize_device (const gchar *device, guint64 new_size, const
21 "before resizing it.", device);
22 return FALSE;
23 }
24- ret = bd_fs_mount (device, mountpoint, "xfs", NULL, NULL, error);
25+ ret = bd_fs_mount (device, mountpoint, "xfs", "nosuid,nodev", NULL, error);
26 if (!ret) {
27 g_prefix_error (error, "Failed to mount '%s' before resizing it: ", device);
28 return FALSE;
29--
302.34.1
31
diff --git a/meta-oe/recipes-extended/libblockdev/libblockdev_2.26.bb b/meta-oe/recipes-extended/libblockdev/libblockdev_2.26.bb
index 3e6df5689a..cb3fde288d 100644
--- a/meta-oe/recipes-extended/libblockdev/libblockdev_2.26.bb
+++ b/meta-oe/recipes-extended/libblockdev/libblockdev_2.26.bb
@@ -12,6 +12,7 @@ inherit autotools gobject-introspection pkgconfig
12 12
13SRC_URI = "git://github.com/storaged-project/libblockdev;branch=2.x-branch;protocol=https \ 13SRC_URI = "git://github.com/storaged-project/libblockdev;branch=2.x-branch;protocol=https \
14 file://0001-lvm-Do-not-include-duplicate-entries-in-bd_lvm_lvs-o.patch \ 14 file://0001-lvm-Do-not-include-duplicate-entries-in-bd_lvm_lvs-o.patch \
15 file://CVE-2025-6019.patch \
15" 16"
16SRCREV = "47ff12242c89e36a33259d18b7068b26c3bb1c64" 17SRCREV = "47ff12242c89e36a33259d18b7068b26c3bb1c64"
17S = "${WORKDIR}/git" 18S = "${WORKDIR}/git"