Bug 2433719 (CVE-2026-26103)

Summary: CVE-2026-26103 udisks: Missing Authorization Check Allows Unprivileged Users to Restore LUKS Headers via udisks D-Bus API
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unprivileged user to instruct the root-owned udisks daemon to overwrite encryption metadata on block devices. This can permanently invalidate encryption keys and render encrypted volumes inaccessible. Successful exploitation results in a denial-of-service condition through irreversible data loss.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2442583, 2442584, 2442585, 2442586    
Bug Blocks:    
Deadline: 2026-02-25   

Description OSIDB Bzimport 2026-01-28 07:59:04 UTC
Missing authorization (polkit) vulnerability in the org.freedesktop.UDisks2.Block.RestoreEncryptedHeader D-Bus method of udisks. The flaw is caused by the absence of a call to udisks_daemon_util_check_authorization_sync() in the handle_restore_encrypted_header() handler. As a result, any local unprivileged user can invoke this system-bus method and cause the root-privileged udisks daemon to call bd_crypto_luks_header_restore() on an arbitrary block device. This enables destructive overwriting of LUKS headers and keyslots without authentication or user interaction, leading to permanent loss of access to encrypted data and a denial-of-service condition.

Comment 2 errata-xmlrpc 2026-03-02 01:36:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:3476 https://access.redhat.com/errata/RHSA-2026:3476