
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-chxf-fjcf-7fwp/CVE-2022-25326) affects fscrypt through version 0.3.2. The issue was discovered and disclosed on February 26, 2022, with an update released on January 11, 2023. The vulnerability affects the filesystem setup process in fscrypt, a filesystem encryption tool (GitHub Advisory).
The vulnerability stems from fscrypt's default behavior of creating world-writable directories during filesystem setup. This security flaw is classified with CWE-400, relating to uncontrolled resource consumption. The severity of this vulnerability is rated as Moderate (GitHub Security).
The vulnerability allows unprivileged local users to potentially exhaust filesystem space through the world-writable directory that fscrypt creates by default during filesystem setup (GitHub Advisory).
Users are recommended to upgrade to fscrypt version 0.3.3 or above. Additionally, system administrators should adjust the permissions on existing fscrypt metadata directories where applicable (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."