First published: Fri Feb 25 2022(Updated: )
The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the fscrypt bash completion script to complete mountpoint paths. We recommend upgrading to version 0.3.3 or above
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Fscrypt | <0.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25328 is classified as a moderate-severity vulnerability.
To fix CVE-2022-25328, you should upgrade the fscrypt package to version 0.3.3 or later.
CVE-2022-25328 affects the fscrypt versions prior to 0.3.3 developed by Google.
Yes, CVE-2022-25328 can allow a local user to escalate privileges if they control mountpoint paths.
The attack vector for CVE-2022-25328 involves injecting commands via crafted mountpoint paths in the bash_completion script for fscrypt.