Vulnerability in Udisks Daemon Affects Red Hat Products
CVE-2025-8067
Key Information:
- Vendor
Red Hat
- Status
- Vendor
- CVE Published:
- 28 August 2025
What is CVE-2025-8067?
CVE-2025-8067 is a vulnerability found in the Udisks daemon, a component commonly utilized in various Linux distributions, particularly those from Red Hat. The Udisks daemon is designed to manage disk devices and provides details about storage devices and filesystems through a D-BUS interface, facilitating interactions with unprivileged users. The vulnerability arises from a failure to properly validate the index parameter when creating loop devices, specifically allowing negative values. This oversight leads to two critical outcomes: it can cause the Udisks daemon to crash and presents an avenue for local privilege escalation. An attacker, by exploiting this flaw, could potentially gain unauthorized access to sensitive files owned by privileged users, creating significant risks for an organization’s data security and integrity.
Potential Impact of CVE-2025-8067
-
Local Privilege Escalation: The vulnerability provides an opportunity for unprivileged users to escalate their privileges, potentially compromising the system and allowing unauthorized access to sensitive resources.
-
System Crashes: Exploiting the flaw can lead to the crashing of the Udisks daemon, disrupting normal operations and leading to potential downtime, which can impact productivity and service availability.
-
Data Exposure Risk: By gaining access to files owned by privileged users, attackers can expose sensitive information, increasing the risk of data breaches and impacting the confidentiality and integrity of critical organizational data.
Affected Version(s)
Red Hat Enterprise Linux 10 0:2.10.90-5.el10_0.1
Red Hat Enterprise Linux 8 0:2.9.0-16.el8_10.1
Red Hat Enterprise Linux 8.2 Advanced Update Support 0:2.8.3-2.el8_2.1
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved