Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: udisks

Found 2 matching suggestions

View:
Compact
Detailed
Permalink CVE-2026-26103
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package deepin.udisks2-qt5
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Udisks: missing authorization check allows unprivileged users to restore luks headers via udisks d-bus api

A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unprivileged user to instruct the root-owned udisks daemon to overwrite encryption metadata on block devices. This can permanently invalidate encryption keys and render encrypted volumes inaccessible. Successful exploitation results in a denial-of-service condition through irreversible data loss.

References

Affected products

udisks
udisks2

Matching in nixpkgs

Ignored packages (1)

Package maintainers

Upstream advisory: https://github.com/storaged-project/udisks/security/advisories/GHSA-c75h-phf8-ccjm
Upstream patch: https://github.com/storaged-project/udisks/commit/dca17c25c12d99a5d4f257b96f9df59c9c02952a
Permalink CVE-2026-26104
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package deepin.udisks2-qt5
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Udisks: missing authorization check allows unprivileged users to back up luks headers via udisks d-bus api

A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method responsible for exporting encryption metadata does not perform a policy check. As a result, sensitive cryptographic metadata can be read and written to attacker-controlled locations. This weakens the confidentiality guarantees of encrypted storage volumes.

References

Affected products

udisks
udisks2

Matching in nixpkgs

Ignored packages (1)

Package maintainers

Upstream advisory: https://github.com/storaged-project/udisks/security/advisories/GHSA-fcvx-497g-6xmw
Upstream patch: https://github.com/storaged-project/udisks/commit/4353c0610089218ac4813edc05cc1662b7a9d6dd