Vulnerability in Udisks Daemon Affects Red Hat Products
CVE-2025-8067

8.5HIGH

What is CVE-2025-8067?

A security flaw discovered in the Udisks daemon allows unprivileged users to create loop devices via the D-BUS interface. The vulnerability arises because the daemon fails to properly validate the lower bounds of the index parameter, enabling potential access to privileged files or causing the service to crash. This issue emphasizes the need for stringent input validation mechanisms to safeguard against unauthorized access and privilege escalation.

References

CVSS V3.1

Score:
8.5
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank Michael Imfeld (born0monday) for reporting this issue.
.
CVE-2025-8067 : Vulnerability in Udisks Daemon Affects Red Hat Products