PT-2025-35093 · Unknown+8 · Udisks Daemon+8
Born0Monday
+1
·
Published
2025-08-27
·
Updated
2026-01-30
·
CVE-2025-8067
CVSS v3.1
8.5
High
| AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H |
Name of the Vulnerable Software and Affected Versions
Udisks versions prior to the fix included in SlackwareLinux security advisory.
Description
A flaw exists in the Udisks daemon that allows unprivileged users to create loop devices via the D-BUS system. This is due to insufficient validation of the
index parameter within the loop device handler, specifically a missing lower bound check. An attacker can exploit this by providing a negative value for the index parameter, potentially causing a crash of the daemon process or gaining access to internal file descriptors, which could lead to local privilege escalation.Recommendations
Apply the security fix included in the latest SlackwareLinux security advisory for udisks2.
Fix
DoS
LPE
Out of bounds Read
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Almalinux
Centos
Linuxmint
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu
Udisks Daemon