Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gpcg-h6x2-c26p | uutils coreutils has an Improper Input Validation issue |
Mon, 04 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:uutils:coreutils:*:*:*:*:*:rust:*:* |
Mon, 27 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Uutils
Uutils coreutils |
|
| Vendors & Products |
Uutils
Uutils coreutils |
Wed, 22 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An argument parsing error in the kill utility of uutils coreutils incorrectly interprets kill -1 as a request to send the default signal (SIGTERM) to PID -1. Sending a signal to PID -1 causes the kernel to terminate all processes visible to the caller, potentially leading to a system crash or massive process termination. This differs from GNU coreutils, which correctly recognizes -1 as a signal number in this context and would instead report a missing PID argument. | |
| Title | uutils coreutils kill System-wide Process Termination and Denial of Service via Argument Misinterpretation | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-22T17:48:32.873Z
Reserved: 2026-04-02T12:58:56.088Z
Link: CVE-2026-35369
Updated: 2026-04-22T17:48:30.050Z
Status : Analyzed
Published: 2026-04-22T17:16:40.687
Modified: 2026-05-04T18:50:23.537
Link: CVE-2026-35369
No data.
OpenCVE Enrichment
Updated: 2026-04-27T19:53:36Z
Github GHSA