Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-532v-xp3f-837c | uutils coreutils has an Incorrect Provision of Specified Functionality Issue in its cut Utility |
Fri, 24 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Uutils
Uutils coreutils |
|
| CPEs | cpe:2.3:a:uutils:coreutils:*:*:*:*:*:rust:*:* | |
| Vendors & Products |
Uutils
Uutils coreutils |
Wed, 22 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A logic error in the cut utility of uutils coreutils causes the utility to ignore the -s (only-delimited) flag when using the -z (null-terminated) and -d '' (empty delimiter) options together. The implementation incorrectly routes this specific combination through a specialized newline-delimiter code path that fails to check the record suppression status. Consequently, uutils cut emits the entire record plus a NUL byte instead of suppressing it. This divergence from GNU coreutils behavior creates a data integrity risk for automated pipelines that rely on cut -s to filter out undelimited data. | |
| Title | uutils coreutils cut Local Logic Error and Data Integrity Issue in Output Filtering | |
| Weaknesses | CWE-684 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-22T16:53:09.992Z
Reserved: 2026-04-02T12:58:56.089Z
Link: CVE-2026-35381
Updated: 2026-04-22T16:52:56.699Z
Status : Analyzed
Published: 2026-04-22T17:16:43.200
Modified: 2026-04-24T19:19:34.493
Link: CVE-2026-35381
No data.
OpenCVE Enrichment
Updated: 2026-04-28T08:00:14Z
Github GHSA