Linux UDisks Daemon Vulnerability Lets Attackers Access Privileged User Files - gbhackers.com
gbhackers.comArchived Mar 20, 2026✓ Full text saved
Linux UDisks Daemon Vulnerability Lets Attackers Access Privileged User Files gbhackers.com
Full text archived locally
✦ AI Summary· Claude Sonnet
CVE/vulnerabilityCyber Security NewsLinux
2 min.Read
Linux UDisks Daemon Vulnerability Lets Attackers Access Privileged User Files
By Divya
September 1, 2025
Share
Facebook
Twitter
Pinterest
WhatsApp
Red Hat has disclosed a critical security flaw in the Udisks daemon that allows unprivileged users to exploit an out-of-bounds read vulnerability and gain access to files owned by privileged accounts.
The vulnerability, tracked as CVE-2025-8067, was publicly released on August 28, 2025, and has been classified with an Important severity rating by Red Hat Product Security.
Under normal operation, the Udisks daemon provides a D-BUS interface for managing storage devices, including the creation and removal of loop devices.
However, a flaw in the loop device handler fails to properly validate the lower bound of the file index parameter supplied by clients.
While the handler ensures the index is not greater than the maximum allowed, it overlooks negative values.
An attacker can exploit this oversight by supplying a negative index, causing the daemon to read memory outside the bounds of the file descriptor list.
CVE Identifier Severity CVSS v3.1 Base Score Remediation
CVE-2025-8067 Important 8.5 Install updated Udisks packages immediately
This out-of-bounds read can result in either a crash of the daemon—triggering a denial-of-service—or the disclosure of sensitive memory contents, such as cryptographic keys or user credentials, owned by privileged users.
According to the advisory, successful exploitation requires no privileges or user interaction, and the attack complexity is considered low.
The vulnerability can be triggered locally by any user with access to the D-BUS interface, making it a significant local privilege escalation risk.
Red Hat’s preliminary CVSS v3.1 score for this issue is 8.5 out of 10, reflecting a high base severity due to the combination of low complexity, no required privileges, and high availability impact.
Affected distributions include Red Hat Enterprise Linux versions 6 through 10, encompassing multiple Udisks packages such as udisks2, libudisks2, udisks2-iscsi, udisks2-lsm, and udisks2-lvm2.
For RHEL 6, packages under the ‘udisks’ and ‘udisks-devel’ names are impacted, although no fixes are planned for those out-of-support versions. For RHEL 7, 8, 9, and 10, updated packages are available and should be installed immediately to mitigate the risk.
Red Hat offers no workaround for CVE-2025-8067 beyond installing the updated packages.
System administrators are urged to update their systems as soon as the patched Udisks packages are made available via the Red Hat Customer Portal or subscription repositories.
Continued operation of vulnerable Udisks daemons may expose systems to local attackers seeking to gain unauthorized access to sensitive files or crash critical storage management services.
Additional technical details and references can be found in the Red Hat Bugzilla entry (ID 2388623) and the NVD record for CVE-2025-8067.
Organizations should review their inventory of affected systems, prioritize patch deployment in multi-user environments, and monitor logs for anomalous D-BUS calls to Udisks.
Failure to address this flaw promptly may enable attackers to bypass protection mechanisms such as ASLR by leveraging leaked memory addresses, thereby facilitating more advanced exploits.
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!
TagsCYBER SECURITYCYBER SECURITY NEWSVULNERABILITY
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.
Hot this week
Infosec- Resources
How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities
SOC Architecture
How to Build and Run a Security Operations Center (SOC Guide) – 2023
Cyber Security News
Network Penetration Testing Checklist – 2025
Cyber Security News
Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component
Checklist
Web Server Penetration Testing Checklist – 2026
Topics
AcquisitionAdobeAdwareAIAmazonAmazon AWSAMDAndroidAnti VirusAntimalwareAntispoofingANY RUNApacheAPIAppleAPTArtificial IntelligenceAvastAWSAzureBackdoorBitcoinBluetoothBotnetBrowserBuffer over flowBug BountyBusinessChatbotsChatGPTChecklistChromeCiscoCISOCISO AdvisoryCloudCloud SecurityCloudflareComputer SecurityCourseCPUCross site ScriptingcryptocurrencyCryptocurrency hackCVE/vulnerabilityCyber AdvisoryCyber AICyber AttackCyber Crimecyber securityCyber security CourseCyber Security NewsCyber Security ResourcesDark WebData BreachData GovernanceDDOSDealsDeepSeekDiscordDNSDos AttackDriveDropboxEducationEmailEmail SecurityEthical HackingExploitExploitation ToolsExtratorrentsFACEBOOKFeaturedFirefoxFirefox NewsFirewallForensics ToolsgameGenAIGitHubGitLabGmailGoogleGoogle dorksGovernanceGRCHacking BooksHacksHardware HackingHBOHTMLHTTPIBMIISIncident ResponseInformation GatheringInformation Security RisksInfosec- ResourcesInsider ThreatsInstagramMore
CVE/vulnerability
Bamboo Data Center and Server Vulnerability Enables Remote Code Execution
CVE/vulnerability
New Critical Jenkins Vulnerabilities Put CI/CD Servers at Risk of RCE Exploits
Cyber Security News
Navia Confirms Data Breach Exposing Sensitive Information of 2.7 Million Users
Android
Microsoft Introduces Teams Upgrades to Improve Windows App Performance on ioS and Android
Cyber Security News
Authorities Dismantle IoT Botnet Linked to Record-Shattering 30 Tbps DDoS Campaigns
Press Release
CISO Whisperer Names 11 Vendors Leading the Shift from Tools to Outcomes at RSA Conference 2026
Cyber Security News
CISA Calls on Organizations to Strengthen Microsoft Intune Security After Stryker Incident
AI
Claude Vulnerabilities Allow Data Exfiltration and Malicious Redirect Attacks
Related Articles
Bamboo Data Center and Server Vulnerability Enables Remote Code Execution
CVE/Vulnerability March 20, 2026
New Critical Jenkins Vulnerabilities Put CI/CD Servers at Risk of RCE Exploits
CVE/Vulnerability March 20, 2026
Navia Confirms Data Breach Exposing Sensitive Information of 2.7 Million Users
Cyber Security News March 20, 2026
Microsoft Introduces Teams Upgrades to Improve Windows App Performance on ioS and Android
Android March 20, 2026
Authorities Dismantle IoT Botnet Linked to Record-Shattering 30 Tbps DDoS Campaigns
Cyber Security News March 20, 2026
Recent News
Bamboo Data Center and Server Vulnerability Enables Remote Code Execution
Divya - March 20, 2026
New Critical Jenkins Vulnerabilities Put CI/CD Servers at Risk of RCE Exploits
Divya - March 20, 2026
Navia Confirms Data Breach Exposing Sensitive Information of 2.7 Million Users
Divya - March 20, 2026
Microsoft Introduces Teams Upgrades to Improve Windows App Performance on ioS and Android
Divya - March 20, 2026
Authorities Dismantle IoT Botnet Linked to Record-Shattering 30 Tbps DDoS Campaigns
Divya - March 20, 2026
CISO Whisperer Names 11 Vendors Leading the Shift from Tools to Outcomes at RSA Conference 2026
CyberNewswire - March 19, 2026