First published: Fri Feb 25 2022(Updated: )
fscrypt through v0.3.2 creates a world-writable directory by default when setting up a filesystem, allowing unprivileged users to exhaust filesystem space. We recommend upgrading to fscrypt 0.3.3 or above and adjusting the permissions on existing fscrypt metadata directories where applicable.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Fscrypt | <=0.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25326 is classified as a high severity vulnerability due to its potential for allowing unprivileged users to exhaust filesystem space.
To fix CVE-2022-25326, upgrade to fscrypt version 0.3.3 or above and adjust the permissions on existing fscrypt metadata directories.
The vulnerability can lead to denial of service by allowing unprivileged users to create a world-writable directory that consumes filesystem space.
CVE-2022-25326 affects fscrypt versions up to and including 0.3.2.
Any user or organization utilizing fscrypt version 0.3.2 or older in their filesystem setup is affected by CVE-2022-25326.