diff options
author | Changqing Li <changqing.li@windriver.com> | 2025-07-03 14:07:01 +0800 |
---|---|---|
committer | Khem Raj <raj.khem@gmail.com> | 2025-07-02 23:27:07 -0700 |
commit | 1978c871f19e477d03c3ecd7cc1246de55f6f205 (patch) | |
tree | 6b4a507fb26aff510e8e0fb193f5ec7b502b6de7 /meta-python/recipes-devtools/python/python3-matplotlib/0001-Do-not-download-external-dependency-tarballs-via-mes.patch | |
parent | f72a91a5d93078f8dd92a5abec42491b8f2c6d60 (diff) | |
download | meta-openembedded-1978c871f19e477d03c3ecd7cc1246de55f6f205.tar.gz |
libblockdev: fix CVE-2025-6019
CVE-2025-6019:
A Local Privilege Escalation (LPE) vulnerability was found in
libblockdev. Generally, the "allow_active" setting in Polkit permits a
physically present user to take certain actions based on the session
type. Due to the way libblockdev interacts with the udisks daemon, an
"allow_active" user on a system may be able escalate to full root
privileges on the target host. Normally, udisks mounts user-provided
filesystem images with security flags like nosuid and nodev to prevent
privilege escalation. However, a local attacker can create a specially
crafted XFS image containing a SUID-root shell, then trick udisks into
resizing it. This mounts their malicious filesystem with root
privileges, allowing them to execute their SUID-root shell and gain
complete control of the system.
Refer:
https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt
Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-matplotlib/0001-Do-not-download-external-dependency-tarballs-via-mes.patch')
0 files changed, 0 insertions, 0 deletions