Major Linux Distributions Have Multiple Vulnerabilities

Share This Post

Unveiling Dual Vulnerabilities in Prominent Linux Distributions

The Background: A Critical Security Alert

In a groundbreaking revelation, security researchers have uncovered two local privilege escalation (LPE) vulnerabilities, specifically CVE-2025-6018 and CVE-2025-6019. These vulnerabilities can be combined to escalate privileges and gain root access on systems running some of the most popular Linux distributions.

Understanding the Impact of These Vulnerabilities

CVE-2025-6018: Elevation of Privileges

The first vulnerability, CVE-2025-6018, grants an unprivileged local attacker the power to escalate their permissions. By exploiting this flaw, attackers can assume the ‘allow_active’ permission and execute actions normally reserved for users physically present at the machine. This vulnerability is specifically found in the Pluggable Authentication Modules (PAM) configuration of openSUSE Leap 15 and SUSE Linux Enterprise 15.

CVE-2025-6019: The Chaining Bypass

The second vulnerability, CVE-2025-6019, becomes particularly alarming when used in conjunction with CVE-2025-6018. It allows an ‘allow_active’ user to leverage the Udisks daemon (a tool for storage management) and the libblockdev library to gain full root access. This flaw exists in libblockdev and is exploitable through the Udisks daemon, which is included by default in most Linux distributions.

Known Exploitations: A Breaching Threat

Both vulnerabilities pose a significant threat, especially when CVE-2025-6018 is exploited first. A local, unprivileged attacker connected via SSH could elevate their status to "active_users" before pulling off a breach that grants them full root privileges through CVE-2025-6019. The Proof of Concept (PoC) exploit is publicly available for further scrutiny: CVE-2025-6019 PoC.

Products Affected: Who Needs to Worry?

The following products are impacted by CVE-2025-6018:

  • openSUSE Leap 15
  • SUSE Linux Enterprise 15

And for CVE-2025-6019:

  • Udisks daemon (found in Ubuntu, Debian, Fedora, openSUSE Leap 15+)

Mitigation: Steps to Safeguard Your Systems

To combat these vulnerabilities, it is imperative for users and system administrators to take immediate action:

  • Apply the latest security patches for openSUSE Leap 15, SUSE Linux Enterprise 15, and libblockdev/udisks packages across affected distributions including Ubuntu, Debian, and Fedora.

This proactive measure can help fortify systems against potential breaches.

Reference Material: Stay Informed

To deepen your understanding and stay updated on these vulnerabilities, check out the following resources:

Stay vigilant and ensure that your systems remain protected against these critical threats. Knowledge is your best defense!

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

Check all Categories of Articles

Do You Want To Boost Your Business?

drop us a line and keep in touch
franetic-agencia-de-marketing-digital-entre-em-contacto