CVE-2026-26103

NameCVE-2026-26103
DescriptionA flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unprivileged user to instruct the root-owned udisks daemon to overwrite encryption metadata on block devices. This can permanently invalidate encryption keys and render encrypted volumes inaccessible. Successful exploitation results in a denial-of-service condition through irreversible data loss.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
udisks2 (PTS)bullseye2.9.2-2+deb11u1fixed
bullseye (security)2.9.2-2+deb11u3fixed
bookworm, bookworm (security)2.9.4-4+deb12u2fixed
trixie (security), trixie2.10.1-12.1+deb13u1fixed
forky2.11.0-2vulnerable
sid2.11.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
udisks2sourcebullseye(not affected)
udisks2sourcebookworm(not affected)
udisks2sourcetrixie(not affected)
udisks2source(unstable)2.11.1-1

Notes

[trixie] - udisks2 <not-affected> (Vulnerable code not present)
[bookworm] - udisks2 <not-affected> (Vulnerable code not present)
[bullseye] - udisks2 <not-affected> (Vulnerable code not present)
https://bugzilla.redhat.com/show_bug.cgi?id=2433719
https://github.com/storaged-project/udisks/security/advisories/GHSA-c75h-phf8-ccjm
Introduces with: https://github.com/storaged-project/udisks/commit/629bcce24a3c368d2ab1dfcb87f0ef23a7fdd1c5 (udisks-2.10.90)
Fixed by: https://github.com/storaged-project/udisks/commit/dca17c25c12d99a5d4f257b96f9df59c9c02952a (udisks-2.11.1)

Search for package or bug name: Reporting problems