CVE-2025-8067
📋 TL;DR
CVE-2025-8067 is an out-of-bounds read vulnerability in the Udisks daemon that allows unprivileged local users to create loop devices with negative index values via D-BUS. This can lead to daemon crashes or local privilege escalation by accessing privileged user files. Affected systems include Linux distributions running vulnerable Udisks versions.
💻 Affected Systems
- Udisks
- Udisks2
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation allowing unprivileged users to gain root access and access sensitive system files.
Likely Case
Denial of service through Udisks daemon crashes and potential information disclosure from privileged files.
If Mitigated
Limited impact with proper access controls and SELinux/apparmor policies restricting D-BUS access.
🎯 Exploit Status
Exploitation requires local user access and knowledge of D-BUS interface calls.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Udisks 2.10.1 or later
Vendor Advisory: https://access.redhat.com/errata/RHSA-2025:15017
Restart Required: Yes
Instructions:
1. Update Udisks package using system package manager. 2. For RHEL/CentOS: 'yum update udisks2'. 3. For Ubuntu/Debian: 'apt update && apt upgrade udisks2'. 4. Restart the Udisks daemon or reboot system.
🔧 Temporary Workarounds
Restrict D-BUS access
linuxLimit D-BUS interface access to Udisks daemon for non-privileged users
systemctl mask udisks2.service
chmod 750 /usr/libexec/udisks2/udisksd
Disable loop device creation
linuxPrevent loop device creation via Udisks policy
Create /etc/dbus-1/system.d/udisks2.conf with restricted permissions
🧯 If You Can't Patch
- Implement strict SELinux/apparmor policies to restrict Udisks daemon capabilities
- Monitor for suspicious D-BUS calls to Udisks interface and restrict user access to D-BUS system
🔍 How to Verify
Check if Vulnerable:
Check Udisks version: 'udisksctl --version' or 'rpm -q udisks2' or 'dpkg -l | grep udisks2'
Check Version:
udisksctl --version
Verify Fix Applied:
Verify version is 2.10.1 or later and test D-BUS interface with negative index values
📡 Detection & Monitoring
Log Indicators:
- Udisks daemon crashes in system logs
- Failed D-BUS calls with negative parameters
- Unauthorized loop device creation attempts
Network Indicators:
- Local D-BUS traffic spikes to Udisks service
SIEM Query:
source="systemd" AND "udisksd" AND ("segmentation fault" OR "crash" OR "aborted")
🔗 References
- https://access.redhat.com/errata/RHSA-2025:15017
- https://access.redhat.com/errata/RHSA-2025:15018
- https://access.redhat.com/errata/RHSA-2025:15020
- https://access.redhat.com/errata/RHSA-2025:15956
- https://access.redhat.com/errata/RHSA-2025:16021
- https://access.redhat.com/errata/RHSA-2025:16090
- https://access.redhat.com/errata/RHSA-2025:16106
- https://access.redhat.com/errata/RHSA-2025:16121
- https://access.redhat.com/errata/RHSA-2025:16122
- https://access.redhat.com/errata/RHSA-2025:16125
- https://access.redhat.com/errata/RHSA-2025:16130
- https://access.redhat.com/security/cve/CVE-2025-8067
- https://bugzilla.redhat.com/show_bug.cgi?id=2388623
- http://www.openwall.com/lists/oss-security/2025/08/28/1
- https://lists.debian.org/debian-lts-announce/2025/08/msg00023.html