Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-88ch-q68x-36v7 | uutils coreutils has an Incorrect Check of Function Return Value |
Mon, 04 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:uutils:coreutils:*:*:*:*:*:rust:*:* |
Mon, 27 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Uutils
Uutils coreutils |
|
| Vendors & Products |
Uutils
Uutils coreutils |
Wed, 22 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw in the ChownExecutor used by uutils coreutils chown and chgrp causes the utilities to return an incorrect exit code during recursive operations. The final exit code is determined only by the last file processed. If the last operation succeeds, the command returns 0 even if earlier ownership or group changes failed due to permission errors. This can lead to security misconfigurations where administrative scripts incorrectly assume that ownership has been successfully transferred across a directory tree. | |
| Title | uutils coreutils chown and chgrp False Success Exit Code in Recursive Mode | |
| Weaknesses | CWE-253 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-22T18:14:26.690Z
Reserved: 2026-04-02T12:58:56.086Z
Link: CVE-2026-35340
Updated: 2026-04-22T18:14:22.272Z
Status : Analyzed
Published: 2026-04-22T17:16:35.923
Modified: 2026-05-04T20:12:01.500
Link: CVE-2026-35340
No data.
OpenCVE Enrichment
Updated: 2026-04-27T19:54:48Z
Github GHSA