Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9gqx-53gp-c8g3 | uutils coreutils allows users to bypass the --preserve-root safety mechanism |
Mon, 27 Apr 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Uutils
Uutils coreutils |
|
| CPEs | cpe:2.3:a:uutils:coreutils:*:*:*:*:*:rust:*:* | |
| Vendors & Products |
Uutils
Uutils coreutils |
Wed, 22 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the chmod utility of uutils coreutils allows users to bypass the --preserve-root safety mechanism. The implementation only validates if the target path is literally / and does not canonicalize the path. An attacker or accidental user can use path variants such as /../ or symbolic links to execute destructive recursive operations (e.g., chmod -R 000) on the entire root filesystem, leading to system-wide permission loss and potential complete system breakdown. | |
| Title | uutils coreutils chmod Path Traversal Bypass of --preserve-root | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-24T03:55:21.897Z
Reserved: 2026-04-02T12:58:56.086Z
Link: CVE-2026-35338
Updated: 2026-04-22T18:10:09.316Z
Status : Analyzed
Published: 2026-04-22T17:16:35.583
Modified: 2026-04-27T12:28:50.307
Link: CVE-2026-35338
No data.
OpenCVE Enrichment
Updated: 2026-04-27T19:54:50Z
Github GHSA