Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. coreutils
  4. ›
  5. CVE-2026-35346

CVE-2026-35346: coreutils' comm utility silently corrupts data by performing lossy UTF-8 conversion on all output lines

April 22, 2026 (updated April 29, 2026)

The comm utility in uutils coreutils silently corrupts data by performing lossy UTF-8 conversion on all output lines. The implementation uses String::from_utf8_lossy(), which replaces invalid UTF-8 byte sequences with the Unicode replacement character (U+FFFD). This behavior differs from GNU comm, which processes raw bytes and preserves the original input. This results in corrupted output when the utility is used to compare binary files or files using non-UTF-8 legacy encodings.

References

  • github.com/advisories/GHSA-hwhf-8p2f-45wr
  • github.com/uutils/coreutils
  • github.com/uutils/coreutils/commit/b9372e509ea9b278fe13763237067a261bb8c946
  • github.com/uutils/coreutils/issues/10192
  • github.com/uutils/coreutils/pull/10206
  • github.com/uutils/coreutils/releases/tag/0.6.0
  • nvd.nist.gov/vuln/detail/CVE-2026-35346

Code Behaviors & Features

Detect and mitigate CVE-2026-35346 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.6.0

Fixed versions

  • 0.6.0

Solution

Upgrade to version 0.6.0 or above.

Impact 3.3 LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-176: Improper Handling of Unicode Encoding

Source file

cargo/coreutils/CVE-2026-35346.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:17:44 +0000.