Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-6019
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Libblockdev: lpe from allow_active to root in libblockdev via udisks
Source: NVD (National Vulnerability Database)
Vulnerability Description
A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
带着不必要的权限执行
Source: NVD (National Vulnerability Database)
Vulnerability Title
Storaged libblockdev 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Storaged libblockdev是Storaged开源的一个用于操纵块设备的库。 Storaged libblockdev存在安全漏洞,该漏洞源于与udisks守护进程交互方式不当,可能导致本地权限提升。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Red HatRed Hat Enterprise Linux 10 0:3.2.0-4.el10_0 ~ * cpe:/o:redhat:enterprise_linux:10.0
Red HatRed Hat Enterprise Linux 7 Extended Lifecycle Support 0:2.18-5.el7_9.1 ~ * cpe:/o:redhat:rhel_els:7
Red HatRed Hat Enterprise Linux 8 0:2.28-7.el8_10 ~ * cpe:/a:redhat:enterprise_linux:8::appstream
Red HatRed Hat Enterprise Linux 8.2 Advanced Update Support 0:2.19-13.el8_2 ~ * cpe:/a:redhat:rhel_aus:8.2::appstream
Red HatRed Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support 0:2.24-6.el8_4 ~ * cpe:/a:redhat:rhel_aus:8.4::appstream
Red HatRed Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support 0:2.24-9.el8_6 ~ * cpe:/a:redhat:rhel_tus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.6 Telecommunications Update Service 0:2.24-9.el8_6 ~ * cpe:/a:redhat:rhel_tus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.6 Update Services for SAP Solutions 0:2.24-9.el8_6 ~ * cpe:/a:redhat:rhel_tus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.8 Update Services for SAP Solutions 0:2.28-3.el8_8 ~ * cpe:/a:redhat:rhel_e4s:8.8::appstream
Red HatRed Hat Enterprise Linux 9 0:2.28-14.el9_6 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9.0 Update Services for SAP Solutions 0:2.25-12.el9_0 ~ * cpe:/a:redhat:rhel_e4s:9.0::appstream
Red HatRed Hat Enterprise Linux 9.2 Update Services for SAP Solutions 0:2.28-5.el9_2 ~ * cpe:/a:redhat:rhel_e4s:9.2::appstream
Red HatRed Hat Enterprise Linux 9.4 Extended Update Support 0:2.28-11.el9_4 ~ * cpe:/a:redhat:rhel_eus:9.4::appstream
II. Public POCs for CVE-2025-6019
#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/guinea-offensive-security/CVE-2025-6019POC Details
2exploithttps://github.com/And-oss/CVE-2025-6019-exploitPOC Details
3Nonehttps://github.com/neko205-mx/CVE-2025-6019_ExploitPOC Details
4Exploit for CVE-2025-6019https://github.com/dreysanox/CVE-2025-6019_PocPOC Details
5Nonehttps://github.com/harshitvarma05/CVE-2025-6019POC Details
6Nonehttps://github.com/robbin0919/CVE-2025-6019POC Details
7Nonehttps://github.com/phamdinhquy2512/CVE-2025-6019-ExploitationPOC Details
8Nonehttps://github.com/0x5chltz/CVE-2025-6019POC Details
9Script-only privilege escalation chain using CVE-2025-6019 and UDisks2 (no filesystem image included).https://github.com/symphony2colour/CVE-2025-6019-udisks-lpe-no-imagePOC Details
10Nonehttps://github.com/boboaung1337/CVE-2025-6019POC Details
11Nonehttps://github.com/HexRazor/CVE-2025-6019POC Details
12CVE-2025-6019: udisks2 XFS Resize TOCTOU Privilege Escalationhttps://github.com/JM00NJ/CVE-2025-6019-udisks2-XFS-Resize-TOCTOU-Privilege-EscalationPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-6019
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-6019

No comments yet


Leave a comment