6.7

CVSS3.1

CVE-2026-35349 - uutils coreutils Path-Based Safety Bypass with --preserve-root

A vulnerability in the rm utility of uutils coreutils allows a bypass of the --preserve-root protection. The implementation uses a path-string check rather than comparing device and inode numbers to identify the root directory. An attacker or accidental user can bypass this safeguard by using a symโ€ฆ

๐Ÿ“… Published: April 22, 2026, 4:07 p.m. ๐Ÿ”„ Last Modified: April 27, 2026, 12:28 p.m.

5.5

CVSS3.1

CVE-2026-35348 - uutils coreutils sort Local Denial of Service via Forced UTF-8 Parsing

The sort utility in uutils coreutils is vulnerable to a process panic when using the --files0-from option with inputs containing non-UTF-8 filenames. The implementation enforces UTF-8 encoding and utilizes expect(), causing an immediate crash when encountering valid but non-UTF-8 paths. This divergโ€ฆ

๐Ÿ“… Published: April 22, 2026, 4:07 p.m. ๐Ÿ”„ Last Modified: April 24, 2026, 6:57 p.m.

4.4

CVSS3.1

CVE-2026-35347 - uutils coreutils comm Silent Data Loss or Denial of Service via Improper Input Validation

The comm utility in uutils coreutils incorrectly consumes data from non-regular file inputs before performing comparison operations. The are_files_identical function opens and reads from both input paths to compare content without first verifying if the paths refer to regular files. If an input patโ€ฆ

๐Ÿ“… Published: April 22, 2026, 4:07 p.m. ๐Ÿ”„ Last Modified: April 27, 2026, 12:28 p.m.

3.3

CVSS3.1

CVE-2026-35346 - uutils coreutils comm Silent Data Corruption via Lossy UTF-8 Normalization

The comm utility in uutils coreutils silently corrupts data by performing lossy UTF-8 conversion on all output lines. The implementation uses String::from_utf8_lossy(), which replaces invalid UTF-8 byte sequences with the Unicode replacement character (U+FFFD). This behavior differs from GNU comm, โ€ฆ

๐Ÿ“… Published: April 22, 2026, 4:07 p.m. ๐Ÿ”„ Last Modified: April 27, 2026, 12:28 p.m.

5.3

CVSS3.1

CVE-2026-35345 - uutils coreutils tail Privileged Information Disclosure via Symlink Replacement Race

A vulnerability in the tail utility of uutils coreutils allows for the exfiltration of sensitive file contents when using the --follow=name option. Unlike GNU tail, the uutils implementation continues to monitor a path after it has been replaced by a symbolic link, subsequently outputting the conteโ€ฆ

๐Ÿ“… Published: April 22, 2026, 4:07 p.m. ๐Ÿ”„ Last Modified: April 27, 2026, 7:54 p.m.

3.3

CVSS3.1

CVE-2026-35344 - uutils coreutils dd Silent Data Corruption via Unconditional Truncation Error Suppression

The dd utility in uutils coreutils suppresses errors during file truncation operations by unconditionally calling Result::ok() on truncation attempts. While intended to mimic GNU behavior for special files like /dev/null, the uutils implementation also hides failures on regular files and directorieโ€ฆ

๐Ÿ“… Published: April 22, 2026, 4:07 p.m. ๐Ÿ”„ Last Modified: April 27, 2026, 7:54 p.m.

3.3

CVSS3.1

CVE-2026-35343 - uutils coreutils cut Inconsistent Output Suppression with Newline Delimiters

The cut utility in uutils coreutils incorrectly handles the -s (only-delimited) option when a newline character is specified as the delimiter. The implementation fails to verify the only_delimited flag in the cut_fields_newline_char_delim function, causing the utility to print non-delimited lines tโ€ฆ

๐Ÿ“… Published: April 22, 2026, 4:07 p.m. ๐Ÿ”„ Last Modified: April 27, 2026, 7:54 p.m.

3.3

CVSS3.1

CVE-2026-35342 - uutils coreutils mktemp Insecure Temporary File Placement via Empty TMPDIR

The mktemp utility in uutils coreutils fails to properly handle an empty TMPDIR environment variable. Unlike GNU mktemp, which falls back to /tmp when TMPDIR is an empty string, the uutils implementation treats the empty string as a valid path. This causes temporary files to be created in the curreโ€ฆ

๐Ÿ“… Published: April 22, 2026, 4:07 p.m. ๐Ÿ”„ Last Modified: April 27, 2026, 7:54 p.m.

7.1

CVSS3.1

CVE-2026-35341 - uutils coreutils mkfifo Unauthorized Permission Change on Existing Files

A vulnerability in uutils coreutils mkfifo allows for the unauthorized modification of permissions on existing files. When mkfifo fails to create a FIFO because a file already exists at the target path, it fails to terminate the operation for that path and continues to execute a follow-up set_permiโ€ฆ

๐Ÿ“… Published: April 22, 2026, 4:07 p.m. ๐Ÿ”„ Last Modified: April 24, 2026, 7:05 p.m.

5.5

CVSS3.1

CVE-2026-35340 - uutils coreutils chown and chgrp False Success Exit Code in Recursive Mode

A flaw in the ChownExecutor used by uutils coreutils chown and chgrp causes the utilities to return an incorrect exit code during recursive operations. The final exit code is determined only by the last file processed. If the last operation succeeds, the command returns 0 even if earlier ownership โ€ฆ

๐Ÿ“… Published: April 22, 2026, 4:07 p.m. ๐Ÿ”„ Last Modified: April 22, 2026, 9:23 p.m.
Total resulsts: 347766
Page 179 of 34,777
ยซ previous page ยป next page
Filters