Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 11 May 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in npitre cramfs-tools up to 2.1. Affected is the function do_directory of the file cramfsck.c of the component Directory Handler. Such manipulation leads to path traversal. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. Upgrading to version 2.2 is able to address this issue. The name of the patch is 2fc492747115b24d8a07eddd27a2d45229cb273c. Upgrading the affected component is recommended. | |
| Title | npitre cramfs-tools Directory cramfsck.c do_directory path traversal | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-11T04:45:10.977Z
Reserved: 2026-05-10T15:58:40.236Z
Link: CVE-2026-8274
No data.
Status : Received
Published: 2026-05-11T05:16:16.580
Modified: 2026-05-11T05:16:16.580
Link: CVE-2026-8274
No data.
OpenCVE Enrichment
No data.