VYPR
Unrated severityNVD Advisory· Published Feb 25, 2026· Updated Mar 25, 2026

Udisks: missing authorization check allows unprivileged users to restore luks headers via udisks d-bus api

CVE-2026-26103

Description

A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unprivileged user to instruct the root-owned udisks daemon to overwrite encryption metadata on block devices. This can permanently invalidate encryption keys and render encrypted volumes inaccessible. Successful exploitation results in a denial-of-service condition through irreversible data loss.

Affected products

7
  • Red Hat/Red Hat Enterprise Linux 10v5
    cpe:/o:redhat:enterprise_linux:10.1
    Range: 0:2.10.90-6.el10_1.1
  • Red Hat/Red Hat Enterprise Linux 6v5
    cpe:/o:redhat:enterprise_linux:6
  • Red Hat/Red Hat Enterprise Linux 7v5
    cpe:/o:redhat:enterprise_linux:7
  • Red Hat/Red Hat Enterprise Linux 8v5
    cpe:/o:redhat:enterprise_linux:8
  • Red Hat/Red Hat Enterprise Linux 9v5
    cpe:/o:redhat:enterprise_linux:9
  • Red Hat/Red Hat Enterprise Linux 10.0 Extended Update Supportv5
    cpe:/o:redhat:enterprise_linux_eus:10.0
    Range: 0:2.10.90-5.el10_0.2
  • udisks/udisksllm-fuzzy

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.