summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-pexpect/0001-FSM.py-change-shebang-from-python-to-python3.patch
diff options
context:
space:
mode:
authorChangqing Li <changqing.li@windriver.com>2025-07-03 19:03:28 +0800
committerArmin Kuster <akuster808@gmail.com>2025-07-13 14:35:44 -0400
commite73af91ee37e49fe8beea0a25bf703d05ed4be18 (patch)
tree9d5fd48a03a7df441668c2cdf984bc8d5999a43f /meta-python/recipes-devtools/python/python3-pexpect/0001-FSM.py-change-shebang-from-python-to-python3.patch
parent058249f9a836e3aa866436aa6e37d6d48ff768fd (diff)
downloadmeta-openembedded-e73af91ee37e49fe8beea0a25bf703d05ed4be18.tar.gz
libblockdev: fix CVE-2025-6019
CVE-2025-6019: A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system. Refer: https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-pexpect/0001-FSM.py-change-shebang-from-python-to-python3.patch')
0 files changed, 0 insertions, 0 deletions