![]() |
|
Message-ID: <20250617200606.GB14637@localhost.localdomain> Date: Tue, 17 Jun 2025 20:07:30 +0000 From: Qualys Security Advisory <qsa@...lys.com> To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: Re: CVE-2025-6019: LPE from allow_active to root in libblockdev via udisks Hi all, Attached to this email are the two libblockdev/udisks patches that we sent to the linux-distros@...nwall last week. Thank you very much! We are at your disposal for questions, comments, and further discussions. With best regards, -- the Qualys Security Advisory team View attachment "0001-dont-allow-suid-and-dev-set-on-fs-resize.patch" of type "text/plain" (1131 bytes) View attachment "0001-udiskslinuxfilesystemhelpers-Mount-private-mounts-wi.patch" of type "text/plain" (1861 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.