CVE-2022-25326Uncontrolled Resource Consumption in Google Fscrypt

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 25
Latest updateAug 21

Description

fscrypt through v0.3.2 creates a world-writable directory by default when setting up a filesystem, allowing unprivileged users to exhaust filesystem space. We recommend upgrading to fscrypt 0.3.3 or above and adjusting the permissions on existing fscrypt metadata directories where applicable.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

Debiangoogle/fscrypt< 0.3.3-1+2
NVDgoogle/fscrypt0.3.2
CVEListV5google_llc/fscryptunspecified0.3.2

Patches

🔴Vulnerability Details

7
OSV
Possible filesystem space exhaustion by local users in github.com/google/fscrypt2024-08-21
GHSA
Possible filesystem space exhaustion by local users2022-03-01
OSV
Possible filesystem space exhaustion by local users2022-03-01
OSV
Uncontrolled Resource Consumption in github.com/google/fscrypt2022-02-26
GHSA
Uncontrolled Resource Consumption in github.com/google/fscrypt2022-02-26

📋Vendor Advisories

1
Debian
CVE-2022-25326: fscrypt - fscrypt through v0.3.2 creates a world-writable directory by default when settin...2022
CVE-2022-25326 — Uncontrolled Resource Consumption | cvebase