Vulnerability in Udisks Daemon Affects Red Hat Products
CVE-2025-8067
8.5HIGH
What is CVE-2025-8067?
A security flaw discovered in the Udisks daemon allows unprivileged users to create loop devices via the D-BUS interface. The vulnerability arises because the daemon fails to properly validate the lower bounds of the index parameter, enabling potential access to privileged files or causing the service to crash. This issue emphasizes the need for stringent input validation mechanisms to safeguard against unauthorized access and privilege escalation.
References
CVSS V3.1
Score:
8.5
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Red Hat would like to thank Michael Imfeld (born0monday) for reporting this issue.