5.5

CVSS3.1

CVE-2026-35369 - uutils coreutils kill System-wide Process Termination and Denial of Service via Argument Misinterpr…

An argument parsing error in the kill utility of uutils coreutils incorrectly interprets kill -1 as a request to send the default signal (SIGTERM) to PID -1. Sending a signal to PID -1 causes the kernel to terminate all processes visible to the caller, potentially leading to a system crash or massi…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: May 4, 2026, 6:50 p.m.

7.2

CVSS3.1

CVE-2026-35368 - uutils coreutils chroot Local Privilege Escalation and chroot Escape in via Name Service Switch (NS…

A vulnerability exists in the chroot utility of uutils coreutils when using the --userspec option. The utility resolves the user specification via getpwnam() after entering the chroot but before dropping root privileges. On glibc-based systems, this can trigger the Name Service Switch (NSS) to load…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 24, 2026, 7:18 p.m.

3.3

CVSS3.1

CVE-2026-35367 - uutils coreutils nohup Information Disclosure via Insecure Default Output Permissions

The nohup utility in uutils coreutils creates its default output file, nohup.out, without specifying explicit restricted permissions. This causes the file to inherit umask-based permissions, typically resulting in a world-readable file (0644). In multi-user environments, this allows any user on the…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 24, 2026, 7:19 p.m.

4.4

CVSS3.1

CVE-2026-35366 - uutils coreutils printenv Security Inspection Bypass via UTF-8 Enforcement

The printenv utility in uutils coreutils fails to display environment variables containing invalid UTF-8 byte sequences. While POSIX permits arbitrary bytes in environment strings, the uutils implementation silently skips these entries rather than printing the raw bytes. This vulnerability allows m…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: May 4, 2026, 6:52 p.m.

6.6

CVSS3.1

CVE-2026-35365 - uutils coreutils mv Denial of Service and Data Duplication via Improper Symlink Expansion

The mv utility in uutils coreutils improperly handles directory trees containing symbolic links during moves across filesystem boundaries. Instead of preserving symlinks, the implementation expands them, copying the linked targets as real files or directories at the destination. This can lead to re…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: May 4, 2026, 6:53 p.m.

6.3

CVSS3.1

CVE-2026-35364 - uutils coreutils mv Arbitrary File Overwrite via Cross-Device TOCTOU Race Condition

A Time-of-Check to Time-of-Use (TOCTOU) race condition exists in the mv utility of uutils coreutils during cross-device operations. The utility removes the destination path before recreating it through a copy operation. A local attacker with write access to the destination directory can exploit thi…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 24, 2026, 7:19 p.m.

5.6

CVSS3.1

CVE-2026-35363 - uutils coreutils rm Safeguard Bypass via Improper Path Normalization

A vulnerability in the rm utility of uutils coreutils allows the bypass of safeguard mechanisms intended to protect the current directory. While the utility correctly refuses to delete . or .., it fails to recognize equivalent paths with trailing slashes, such as ./ or .///. An accidental or malici…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 24, 2026, 7:02 p.m.

3.6

CVSS3.1

CVE-2026-35362 - uutils coreutils Missing TOCTOU Protection on Non-Linux Unix Platforms in Safe Traversal Module

The safe_traversal module in uutils coreutils, which provides protection against Time-of-Check to Time-of-Use (TOCTOU) symlink races using file-descriptor-relative syscalls, is incorrectly limited to Linux targets. On other Unix-like systems such as macOS and FreeBSD, the utility fails to utilize t…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 27, 2026, 12:26 p.m.

3.4

CVSS3.1

CVE-2026-35361 - uutils coreutils mknod Security Label Inconsistency and Broken Cleanup on SELinux Systems

The mknod utility in uutils coreutils fails to handle security labels atomically by creating device nodes before setting the SELinux context. If labeling fails, the utility attempts cleanup using std::fs::remove_dir, which cannot remove device nodes or FIFOs. This leaves mislabeled nodes behind wit…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 27, 2026, 12:27 p.m.

6.3

CVSS3.1

CVE-2026-35360 - uutils coreutils touch Arbitrary File Truncation via TOCTOU Race Condition

The touch utility in uutils coreutils is vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition during file creation. When the utility identifies a missing path, it later attempts creation using File::create(), which internally uses O_TRUNC. An attacker can exploit this window to crea…

📅 Published: April 22, 2026, 4:08 p.m. 🔄 Last Modified: April 24, 2026, 7:02 p.m.
Total resulsts: 347969
Page 197 of 34,797
« previous page » next page
Filters