目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2025-6019 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Libblockdev: lpe from allow_active to root in libblockdev via udisks
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
带着不必要的权限执行
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Storaged libblockdev 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Storaged libblockdev是Storaged开源的一个用于操纵块设备的库。 Storaged libblockdev存在安全漏洞,该漏洞源于与udisks守护进程交互方式不当,可能导致本地权限提升。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
Red HatRed Hat Enterprise Linux 10 0:3.2.0-4.el10_0 ~ * cpe:/o:redhat:enterprise_linux:10.0
Red HatRed Hat Enterprise Linux 7 Extended Lifecycle Support 0:2.18-5.el7_9.1 ~ * cpe:/o:redhat:rhel_els:7
Red HatRed Hat Enterprise Linux 8 0:2.28-7.el8_10 ~ * cpe:/a:redhat:enterprise_linux:8::appstream
Red HatRed Hat Enterprise Linux 8.2 Advanced Update Support 0:2.19-13.el8_2 ~ * cpe:/a:redhat:rhel_aus:8.2::appstream
Red HatRed Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support 0:2.24-6.el8_4 ~ * cpe:/a:redhat:rhel_aus:8.4::appstream
Red HatRed Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support 0:2.24-9.el8_6 ~ * cpe:/a:redhat:rhel_tus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.6 Telecommunications Update Service 0:2.24-9.el8_6 ~ * cpe:/a:redhat:rhel_tus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.6 Update Services for SAP Solutions 0:2.24-9.el8_6 ~ * cpe:/a:redhat:rhel_tus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.8 Update Services for SAP Solutions 0:2.28-3.el8_8 ~ * cpe:/a:redhat:rhel_e4s:8.8::appstream
Red HatRed Hat Enterprise Linux 9 0:2.28-14.el9_6 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9.0 Update Services for SAP Solutions 0:2.25-12.el9_0 ~ * cpe:/a:redhat:rhel_e4s:9.0::appstream
Red HatRed Hat Enterprise Linux 9.2 Update Services for SAP Solutions 0:2.28-5.el9_2 ~ * cpe:/a:redhat:rhel_e4s:9.2::appstream
Red HatRed Hat Enterprise Linux 9.4 Extended Update Support 0:2.28-11.el9_4 ~ * cpe:/a:redhat:rhel_eus:9.4::appstream
二、漏洞 CVE-2025-6019 的公开POC
#POC 描述源链接神龙链接
1Nonehttps://github.com/guinea-offensive-security/CVE-2025-6019POC详情
2exploithttps://github.com/And-oss/CVE-2025-6019-exploitPOC详情
3Nonehttps://github.com/neko205-mx/CVE-2025-6019_ExploitPOC详情
4Exploit for CVE-2025-6019https://github.com/dreysanox/CVE-2025-6019_PocPOC详情
5Nonehttps://github.com/harshitvarma05/CVE-2025-6019POC详情
6Nonehttps://github.com/robbin0919/CVE-2025-6019POC详情
7Nonehttps://github.com/phamdinhquy2512/CVE-2025-6019-ExploitationPOC详情
8Nonehttps://github.com/0x5chltz/CVE-2025-6019POC详情
9Script-only privilege escalation chain using CVE-2025-6019 and UDisks2 (no filesystem image included).https://github.com/symphony2colour/CVE-2025-6019-udisks-lpe-no-imagePOC详情
10Nonehttps://github.com/boboaung1337/CVE-2025-6019POC详情
11Nonehttps://github.com/HexRazor/CVE-2025-6019POC详情
12CVE-2025-6019: udisks2 XFS Resize TOCTOU Privilege Escalationhttps://github.com/JM00NJ/CVE-2025-6019-udisks2-XFS-Resize-TOCTOU-Privilege-EscalationPOC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2025-6019 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-6019

暂无评论


发表评论