Description
The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the fscrypt bash completion script to complete mountpoint paths. We recommend upgrading to version 0.3.3 or above
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1242 | The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the fscrypt bash completion script to complete mountpoint paths. We recommend upgrading to version 0.3.3 or above |
Github GHSA |
GHSA-wxjg-p59j-6c92 | Command injection in github.com/google/fscrypt |
References
| Link | Providers |
|---|---|
| https://github.com/google/fscrypt/pull/346 |
|
History
Tue, 22 Apr 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-04-21T13:56:13.459Z
Reserved: 2022-02-18T00:00:00.000Z
Link: CVE-2022-25328
Updated: 2024-08-03T04:36:06.919Z
Status : Modified
Published: 2022-02-25T11:15:08.120
Modified: 2024-11-21T06:52:00.670
Link: CVE-2022-25328
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA