github.com/google/fscrypt/pam is a Go tool for managing Linux filesystem encryption.
Affected versions of the package are vulnerable to Privilege Escalation. It incorrectly restored primary and supplementary group IDs to the values associated with the root user, which allowed attackers to gain privileges via a successful login through certain applications that use Linux-PAM (aka pam).
github.com/google/fscrypt/pam to version 0.2.4 or higher.
Do your applications use this vulnerable package?