CVE-2026-26104

NameCVE-2026-26104
DescriptionA flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method responsible for exporting encryption metadata does not perform a policy check. As a result, sensitive cryptographic metadata can be read and written to attacker-controlled locations. This weakens the confidentiality guarantees of encrypted storage volumes.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
udisks2 (PTS)bullseye2.9.2-2+deb11u1fixed
bullseye (security)2.9.2-2+deb11u3fixed
bookworm, bookworm (security)2.9.4-4+deb12u2fixed
trixie (security), trixie2.10.1-12.1+deb13u1fixed
forky2.11.0-2vulnerable
sid2.11.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
udisks2sourcebullseye(not affected)
udisks2sourcebookworm(not affected)
udisks2sourcetrixie(not affected)
udisks2source(unstable)2.11.1-1

Notes

[trixie] - udisks2 <not-affected> (Vulnerable code not present)
[bookworm] - udisks2 <not-affected> (Vulnerable code not present)
[bullseye] - udisks2 <not-affected> (Vulnerable code not present)
https://bugzilla.redhat.com/show_bug.cgi?id=2433717
https://github.com/storaged-project/udisks/security/advisories/GHSA-fcvx-497g-6xmw
Introduced with: https://github.com/storaged-project/udisks/commit/629bcce24a3c368d2ab1dfcb87f0ef23a7fdd1c5 (udisks-2.10.90)
Fixed by: https://github.com/storaged-project/udisks/commit/4353c0610089218ac4813edc05cc1662b7a9d6dd (udisks-2.11.1)

Search for package or bug name: Reporting problems