Vulnerability in Udisks Daemon Affects Red Hat Products
CVE-2025-8067

8.5HIGH

What is CVE-2025-8067?

CVE-2025-8067 is a vulnerability found in the Udisks daemon, a component commonly utilized in various Linux distributions, particularly those from Red Hat. The Udisks daemon is designed to manage disk devices and provides details about storage devices and filesystems through a D-BUS interface, facilitating interactions with unprivileged users. The vulnerability arises from a failure to properly validate the index parameter when creating loop devices, specifically allowing negative values. This oversight leads to two critical outcomes: it can cause the Udisks daemon to crash and presents an avenue for local privilege escalation. An attacker, by exploiting this flaw, could potentially gain unauthorized access to sensitive files owned by privileged users, creating significant risks for an organization’s data security and integrity.

Potential Impact of CVE-2025-8067

  1. Local Privilege Escalation: The vulnerability provides an opportunity for unprivileged users to escalate their privileges, potentially compromising the system and allowing unauthorized access to sensitive resources.

  2. System Crashes: Exploiting the flaw can lead to the crashing of the Udisks daemon, disrupting normal operations and leading to potential downtime, which can impact productivity and service availability.

  3. Data Exposure Risk: By gaining access to files owned by privileged users, attackers can expose sensitive information, increasing the risk of data breaches and impacting the confidentiality and integrity of critical organizational data.

Affected Version(s)

Red Hat Enterprise Linux 10 0:2.10.90-5.el10_0.1

Red Hat Enterprise Linux 8 0:2.9.0-16.el8_10.1

Red Hat Enterprise Linux 8.2 Advanced Update Support 0:2.8.3-2.el8_2.1

References

CVSS V3.1

Score:
8.5
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank Michael Imfeld (born0monday) for reporting this issue.
.