Impact
The flaw lies in the change_file_status function of cramfsck.c, which can be engineered by a local attacker to follow a symlink and access or overwrite files outside the expected directory structure. This attack enables the attacker to read or modify unintended files, compromising data integrity and confidentiality, but it does not provide remote code execution or privilege escalation.
Affected Systems
The vulnerability affects npitre cramfs-tools releases up to and including version 2.2. Any build within that range that contains the described function is potentially vulnerable; no further version granularity is provided in the CNA data.
Risk and Exploitability
With a CVSS score of 4.6 the issue is of moderate severity. The EPSS value is unavailable, so the likelihood of exploitation is unknown, and the vulnerability is not listed in CISA KEV. Exploitation requires local access and the ability to run the program with sufficient rights to alter the target filesystem. If exploited, it may lead to unauthorized file reads or writes, but the attacker cannot gain code execution or elevate privileges.
OpenCVE Enrichment