Description
A vulnerability exists in the chroot utility of uutils coreutils when using the --userspec option. The utility resolves the user specification via getpwnam() after entering the chroot but before dropping root privileges. On glibc-based systems, this can trigger the Name Service Switch (NSS) to load shared libraries (e.g., libnss_*.so.2) from the new root directory. If the NEWROOT is writable by an attacker, they can inject a malicious NSS module to execute arbitrary code as root, facilitating a full container escape or privilege escalation.
INFO
Published Date :
2026-04-22T16:08:48.965Z
Last Modified :
2026-04-25T03:55:34.110Z
Source :
canonical
AFFECTED PRODUCTS
The following products are affected by CVE-2026-35368 vulnerability.
| Vendors | Products |
|---|---|
| Uutils |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-35368.
| URL | Resource |
|---|---|
| https://github.com/uutils/coreutils/issues/10327 |
|