The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the fscrypt bash completion script to complete mountpoint paths. We recommend upgrading to version 0.3.3 or above
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1242 | The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the fscrypt bash completion script to complete mountpoint paths. We recommend upgrading to version 0.3.3 or above |
Github GHSA |
GHSA-wxjg-p59j-6c92 | Command injection in github.com/google/fscrypt |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/google/fscrypt/pull/346 |
|
History
Tue, 22 Apr 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-04-21T13:56:13.459Z
Reserved: 2022-02-18T00:00:00.000Z
Link: CVE-2022-25328
Updated: 2024-08-03T04:36:06.919Z
Status : Modified
Published: 2022-02-25T11:15:08.120
Modified: 2024-11-21T06:52:00.670
Link: CVE-2022-25328
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA