Vulnerability Description
A vulnerability was detected in npitre cramfs-tools up to 2.2. Affected is the function change_file_status of the file cramfsck.c. Performing a manipulation results in symlink following. The attack requires a local approach. The exploit is now public and may be used. The patch is named b4a3a695c9873f824907bd15659f2a6ac7667b4f. It is recommended to apply a patch to fix this issue.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/npitre/cramfs-tools/
- https://github.com/npitre/cramfs-tools/commit/b4a3a695c9873f824907bd15659f2a6ac7
- https://github.com/npitre/cramfs-tools/issues/13
- https://github.com/npitre/cramfs-tools/issues/13#issuecomment-4306102583
- https://vuldb.com/submit/811897
- https://vuldb.com/vuln/364408
- https://vuldb.com/vuln/364408/cti
FAQ
What is CVE-2026-8784?
CVE-2026-8784 is a vulnerability with a CVSS score of 4.2 (MEDIUM). A vulnerability was detected in npitre cramfs-tools up to 2.2. Affected is the function change_file_status of the file cramfsck.c. Performing a manipulation results in symlink following. The attack re...
How severe is CVE-2026-8784?
CVE-2026-8784 has been rated MEDIUM with a CVSS base score of 4.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-8784?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.