vulnerability
Rocky Linux: CVE-2025-8067: udisks2 (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:L/AC:L/Au:N/C:P/I:P/A:C) | Oct 10, 2025 | Feb 5, 2026 | Feb 9, 2026 |
Severity
6
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:C)
Published
Oct 10, 2025
Added
Feb 5, 2026
Modified
Feb 9, 2026
Description
The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies.
Solutions
rocky-upgrade-libudisks2rocky-upgrade-libudisks2-debuginforocky-upgrade-libudisks2-develrocky-upgrade-udisks2rocky-upgrade-udisks2-debuginforocky-upgrade-udisks2-debugsourcerocky-upgrade-udisks2-iscsirocky-upgrade-udisks2-iscsi-debuginforocky-upgrade-udisks2-lsmrocky-upgrade-udisks2-lsm-debuginforocky-upgrade-udisks2-lvm2rocky-upgrade-udisks2-lvm2-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.