Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wq63-vh5h-pr5p | uutils coreutils has a UNIX Symbolic Link (Symlink) Following issue |
Mon, 04 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:uutils:coreutils:*:*:*:*:*:rust:*:* |
Mon, 27 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Uutils
Uutils coreutils |
|
| Vendors & Products |
Uutils
Uutils coreutils |
Wed, 22 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A logic error in the ln utility of uutils coreutils allows the utility to dereference a symbolic link target even when the --no-dereference (or -n) flag is explicitly provided. The implementation previously only honored the "no-dereference" intent if the --force (overwrite) mode was also enabled. This flaw causes ln to follow a symbolic link that points to a directory and create new links inside that target directory instead of treating the symbolic link itself as the destination. In environments where a privileged user or system script uses ln -n to update a symlink, a local attacker could manipulate existing symbolic links to redirect file creation into sensitive directories, potentially leading to unauthorized file creation or system misconfiguration. | |
| Title | uutils coreutils ln Security Bypass via Improper Handling of the --no-dereference Flag | |
| Weaknesses | CWE-61 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-22T17:21:15.165Z
Reserved: 2026-04-02T12:58:56.088Z
Link: CVE-2026-35372
Updated: 2026-04-22T17:21:11.399Z
Status : Analyzed
Published: 2026-04-22T17:16:41.850
Modified: 2026-05-04T18:49:46.510
Link: CVE-2026-35372
No data.
OpenCVE Enrichment
Updated: 2026-04-27T19:53:32Z
Github GHSA