Tech »  Topic »  Linux UDisks Daemon Vulnerability Lets Attackers Access Privileged User Files

Linux UDisks Daemon Vulnerability Lets Attackers Access Privileged User Files


Red Hat has disclosed a critical security flaw in the Udisks daemon that allows unprivileged users to exploit an out-of-bounds read vulnerability and gain access to files owned by privileged accounts.

The vulnerability, tracked as CVE-2025-8067, was publicly released on August 28, 2025, and has been classified with an Important severity rating by Red Hat Product Security.

Under normal operation, the Udisks daemon provides a D-BUS interface for managing storage devices, including the creation and removal of loop devices.

However, a flaw in the loop device handler fails to properly validate the lower bound of the file index parameter supplied by clients.

While the handler ensures the index is not greater than the maximum allowed, it overlooks negative values.

An attacker can exploit this oversight by supplying a negative index, causing the daemon to read memory outside the bounds of the file descriptor list.

CVE Identifier Severity CVSS v3.1 ...

Copyright of this story solely belongs to gbhackers . To see the full text click HERE