Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXFqMjYtN2dyai13aGcz
Privilege Escalation in fscrypt
The pam_fscrypt module in fscrypt before 0.2.4 may incorrectly restore primary and supplementary group IDs to the values associated with the root user, which allows attackers to gain privileges via a successful login through certain applications that use Linux-PAM (aka pam).
Permalink: https://github.com/advisories/GHSA-qj26-7grj-whg3JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXFqMjYtN2dyai13aGcz
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 3 years ago
Updated: 5 months ago
CVSS Score: 6.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Identifiers: GHSA-qj26-7grj-whg3, CVE-2018-6558
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-6558
- https://github.com/google/fscrypt/issues/77
- https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b
- https://github.com/google/fscrypt/commit/315f9b042237200174a1fb99427f74027e191d66
- https://launchpad.net/bugs/1787548
- https://pkg.go.dev/vuln/GO-2020-0027
- https://github.com/advisories/GHSA-qj26-7grj-whg3
Blast Radius: 9.1
Affected Packages
go:github.com/google/fscrypt
Dependent packages: 21Dependent repositories: 25
Downloads:
Affected Version Ranges: < 0.2.4
Fixed in: 0.2.4
All affected versions: 0.1.0, 0.2.0, 0.2.1, 0.2.2, 0.2.3
All unaffected versions: 0.2.4, 0.2.5, 0.2.6, 0.2.7, 0.2.8, 0.2.9, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 0.3.4, 0.3.5