Privilege Escalation Affecting github.com/google/fscrypt/pam package, versions <0.2.4
Snyk CVSS
Attack Complexity
Low
Integrity
High
Threat Intelligence
EPSS
0.11% (43rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMGOOGLEFSCRYPTPAM-50083
- published 29 Aug 2018
- disclosed 22 Jan 2018
- credit Unknown
Introduced: 22 Jan 2018
CVE-2018-6558 Open this link in a new tabHow to fix?
Upgrade github.com/google/fscrypt/pam
to version 0.2.4 or higher.
Overview
github.com/google/fscrypt/pam
is a Go tool for managing Linux filesystem encryption.
Affected versions of the package are vulnerable to Privilege Escalation. It incorrectly restored primary and supplementary group IDs to the values associated with the root user, which allowed attackers to gain privileges via a successful login through certain applications that use Linux-PAM (aka pam).