Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-fhr3-xh3q-69w6 | uutils coreutils has an Incorrect Provision of Specified Functionality Issue |
Wed, 29 Apr 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:uutils:coreutils:*:*:*:*:*:rust:*:* |
Mon, 27 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Uutils
Uutils coreutils |
|
| Vendors & Products |
Uutils
Uutils coreutils |
Wed, 22 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A logic error in the tr utility of uutils coreutils causes the program to incorrectly define the [:graph:] and [:print:] character classes. The implementation mistakenly includes the ASCII space character (0x20) in the [:graph:] class and excludes it from the [:print:] class, effectively reversing the standard behavior established by POSIX and GNU coreutils. This vulnerability leads to unintended data modification or loss when the utility is used in automated scripts or data-cleaning pipelines that rely on standard character class semantics. For example, a command executed to delete all graphical characters while intending to preserve whitespace will incorrectly delete all ASCII spaces, potentially resulting in data corruption or logic failures in downstream processing. | |
| Title | uutils coreutils tr Local Logic Error and Data Integrity Issue in Character Class Handling | |
| Weaknesses | CWE-684 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-22T16:59:11.751Z
Reserved: 2026-04-02T12:58:56.089Z
Link: CVE-2026-35379
Updated: 2026-04-22T16:59:07.039Z
Status : Analyzed
Published: 2026-04-22T17:16:42.887
Modified: 2026-04-29T15:59:08.450
Link: CVE-2026-35379
No data.
OpenCVE Enrichment
Updated: 2026-04-28T15:30:34Z
Github GHSA