5

CVSS3.1

CVE-2026-35372 - uutils coreutils ln Security Bypass via Improper Handling of the --no-dereference Flag

A logic error in the ln utility of uutils coreutils allows the utility to dereference a symbolic link target even when the --no-dereference (or -n) flag is explicitly provided. The implementation previously only honored the "no-dereference" intent if the --force (overwrite) mode was also enabled. T…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 22, 2026, 9:23 p.m.

3.3

CVSS3.1

CVE-2026-35371 - uutils coreutils id Misleading Identity Reporting in Pretty Print Mode

The id utility in uutils coreutils exhibits incorrect behavior in its "pretty print" output when the real UID and effective UID differ. The implementation incorrectly uses the effective GID instead of the effective UID when performing a name lookup for the effective user. This results in misleading…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 22, 2026, 9:23 p.m.

4.4

CVSS3.1

CVE-2026-35370 - uutils coreutils id Incorrect Access-Control Decisions via Misrepresented Group Membership

The id utility in uutils coreutils miscalculates the groups= section of its output. The implementation uses a user's real GID instead of their effective GID to compute the group list, leading to potentially divergent output compared to GNU coreutils. Because many scripts and automated processes rel…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 22, 2026, 9:23 p.m.

5.5

CVSS3.1

CVE-2026-35369 - uutils coreutils kill System-wide Process Termination and Denial of Service via Argument Misinterpr…

An argument parsing error in the kill utility of uutils coreutils incorrectly interprets kill -1 as a request to send the default signal (SIGTERM) to PID -1. Sending a signal to PID -1 causes the kernel to terminate all processes visible to the caller, potentially leading to a system crash or massi…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 22, 2026, 9:23 p.m.

7.2

CVSS3.1

CVE-2026-35368 - uutils coreutils chroot Local Privilege Escalation and chroot Escape in via Name Service Switch (NS…

A vulnerability exists in the chroot utility of uutils coreutils when using the --userspec option. The utility resolves the user specification via getpwnam() after entering the chroot but before dropping root privileges. On glibc-based systems, this can trigger the Name Service Switch (NSS) to load…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 24, 2026, 7:18 p.m.

3.3

CVSS3.1

CVE-2026-35367 - uutils coreutils nohup Information Disclosure via Insecure Default Output Permissions

The nohup utility in uutils coreutils creates its default output file, nohup.out, without specifying explicit restricted permissions. This causes the file to inherit umask-based permissions, typically resulting in a world-readable file (0644). In multi-user environments, this allows any user on the…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 24, 2026, 7:19 p.m.

4.4

CVSS3.1

CVE-2026-35366 - uutils coreutils printenv Security Inspection Bypass via UTF-8 Enforcement

The printenv utility in uutils coreutils fails to display environment variables containing invalid UTF-8 byte sequences. While POSIX permits arbitrary bytes in environment strings, the uutils implementation silently skips these entries rather than printing the raw bytes. This vulnerability allows m…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 22, 2026, 9:23 p.m.

6.6

CVSS3.1

CVE-2026-35365 - uutils coreutils mv Denial of Service and Data Duplication via Improper Symlink Expansion

The mv utility in uutils coreutils improperly handles directory trees containing symbolic links during moves across filesystem boundaries. Instead of preserving symlinks, the implementation expands them, copying the linked targets as real files or directories at the destination. This can lead to re…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 22, 2026, 9:23 p.m.

6.3

CVSS3.1

CVE-2026-35364 - uutils coreutils mv Arbitrary File Overwrite via Cross-Device TOCTOU Race Condition

A Time-of-Check to Time-of-Use (TOCTOU) race condition exists in the mv utility of uutils coreutils during cross-device operations. The utility removes the destination path before recreating it through a copy operation. A local attacker with write access to the destination directory can exploit thi…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 24, 2026, 7:19 p.m.

5.6

CVSS3.1

CVE-2026-35363 - uutils coreutils rm Safeguard Bypass via Improper Path Normalization

A vulnerability in the rm utility of uutils coreutils allows the bypass of safeguard mechanisms intended to protect the current directory. While the utility correctly refuses to delete . or .., it fails to recognize equivalent paths with trailing slashes, such as ./ or .///. An accidental or malici…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 24, 2026, 7:02 p.m.
Total resulsts: 347056
Page 107 of 34,706
« previous page » next page
Filters