Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mh5c-xrmh-m794 | uutils coreutils has an Untrusted Search Path |
| Link | Providers |
|---|---|
| https://github.com/uutils/coreutils/issues/10327 |
|
Fri, 24 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Uutils
Uutils coreutils |
|
| CPEs | cpe:2.3:a:uutils:coreutils:-:*:*:*:*:rust:*:* | |
| Vendors & Products |
Uutils
Uutils coreutils |
Wed, 22 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability exists in the chroot utility of uutils coreutils when using the --userspec option. The utility resolves the user specification via getpwnam() after entering the chroot but before dropping root privileges. On glibc-based systems, this can trigger the Name Service Switch (NSS) to load shared libraries (e.g., libnss_*.so.2) from the new root directory. If the NEWROOT is writable by an attacker, they can inject a malicious NSS module to execute arbitrary code as root, facilitating a full container escape or privilege escalation. | |
| Title | uutils coreutils chroot Local Privilege Escalation and chroot Escape in via Name Service Switch (NSS) Injection | |
| Weaknesses | CWE-426 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-25T03:55:34.110Z
Reserved: 2026-04-02T12:58:56.088Z
Link: CVE-2026-35368
Updated: 2026-04-22T17:48:51.326Z
Status : Analyzed
Published: 2026-04-22T17:16:40.560
Modified: 2026-04-24T19:18:55.670
Link: CVE-2026-35368
No data.
OpenCVE Enrichment
Updated: 2026-04-27T19:53:37Z
Github GHSA