New critical Linux flaws let attackers escalate to root via PAM and udisks vulnerabilities

New critical Linux flaws let attackers escalate to root via PAM and udisks vulnerabilities

The Qualys Threat Research Unit has disclosed two linked local privilege escalation vulnerabilities which affect a broad range of Linux systems. The first, CVE-2025-6018, impacts openSUSE Leap 15 and SUSE Linux Enterprise 15. It centers on the PAM (Pluggable Authentication Modules) stack, which determines if users are considered “active” and eligible for privileged actions. This flaw lets unprivileged local attackers, including those connecting via SSH, escalate their status to allow_active and trigger actions normally restricted to physically present users through polkit.

The second vulnerability, CVE-2025-6019, resides in libblockdev and is exploitable through the udisks daemon. Udisks ships by default on most Linux distributions and provides a D-Bus interface for local storage management. While exploitation requires allow_active privileges, the ease of obtaining them through the PAM flaw means nearly any unprivileged attacker can combine both bugs for full root access.

These exploits remove the barriers between standard logins and root, allowing any attacker with an active graphical or SSH session to take over affected systems in seconds. Qualys emphasizes the criticality due to the ubiquity of udisks and the simplicity of the required techniques, advising organizations to patch without delay.

by Paul

du
TBayAreaPat
ma
K0RR
duttyend found this interesting
  • ...

The Linux kernel is the core component of the Linux operating system, crucial for managing system resources and enabling communication between hardware and software. Created by Linus Torvalds in 1991, it is open-source and highly rated at 4.6. Key features include a command line interface and an ad-free experience. It caters to technical users and is considered geek-friendly.

Comments

UserPower
2

So far, both flaws need to be exploited together to get full root access. As udisks is be common, PAM is mostly an entreprise tool (that allow to check if the user is physically present, like used an USB key). Still, it's pretty serious (scored 7/10 on CVE) but already patched (nearly a week ago).

1 reply
youlk1234

I cannot agree with you on your point with PAM. If you are able to login on:

  • SSH
  • lightdm
  • sddm
  • gdm
  • tty it's because PAM is asked by these services if the user credentials used are right. You use PAM everyday if you use Linux. It is true that users modifying their PAM module configuration are mostly entreprises, but everybody has it on his system. As for the "usb key" you mentionned, this is not a usecase for PAM, but for udisks. Honestly i am surprised by it being only 7/10 and not 9/10 because this is very serious (aka anybody with Linux could be hacked).
Gu