Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-53gr-wmf4-8hh3 | uutils coreutils's User Interface (UI) Misrepresents Critical Information |
| Link | Providers |
|---|---|
| https://github.com/uutils/coreutils/issues/10006 |
|
Mon, 04 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:uutils:coreutils:-:*:*:*:*:rust:*:* |
Mon, 27 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Uutils
Uutils coreutils |
|
| Vendors & Products |
Uutils
Uutils coreutils |
Wed, 22 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The id utility in uutils coreutils exhibits incorrect behavior in its "pretty print" output when the real UID and effective UID differ. The implementation incorrectly uses the effective GID instead of the effective UID when performing a name lookup for the effective user. This results in misleading diagnostic output that can cause automated scripts or system administrators to make incorrect decisions regarding file permissions or access control. | |
| Title | uutils coreutils id Misleading Identity Reporting in Pretty Print Mode | |
| Weaknesses | CWE-451 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-22T17:47:18.201Z
Reserved: 2026-04-02T12:58:56.088Z
Link: CVE-2026-35371
Updated: 2026-04-22T17:47:10.726Z
Status : Analyzed
Published: 2026-04-22T17:16:40.987
Modified: 2026-05-04T20:02:06.183
Link: CVE-2026-35371
No data.
OpenCVE Enrichment
Updated: 2026-04-27T19:53:34Z
Github GHSA