Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-f2jv-wjjc-2c94 | uutils coreutils has an Uncaught Exception When Encountering Valid but Non-UTF-8 Paths |
| Link | Providers |
|---|---|
| https://github.com/uutils/coreutils/issues/9696 |
|
Fri, 24 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Uutils
Uutils coreutils |
|
| CPEs | cpe:2.3:a:uutils:coreutils:-:*:*:*:*:rust:*:* | |
| Vendors & Products |
Uutils
Uutils coreutils |
Wed, 22 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The sort utility in uutils coreutils is vulnerable to a process panic when using the --files0-from option with inputs containing non-UTF-8 filenames. The implementation enforces UTF-8 encoding and utilizes expect(), causing an immediate crash when encountering valid but non-UTF-8 paths. This diverges from GNU sort, which treats filenames as raw bytes. A local attacker can exploit this to crash the utility and disrupt automated pipelines. | |
| Title | uutils coreutils sort Local Denial of Service via Forced UTF-8 Parsing | |
| Weaknesses | CWE-248 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-22T18:21:11.748Z
Reserved: 2026-04-02T12:58:56.087Z
Link: CVE-2026-35348
Updated: 2026-04-22T18:18:16.368Z
Status : Analyzed
Published: 2026-04-22T17:16:37.040
Modified: 2026-04-24T18:57:20.927
Link: CVE-2026-35348
No data.
OpenCVE Enrichment
Updated: 2026-04-27T19:54:37Z
Github GHSA