CVE-2026-35346: coreutils' comm utility silently corrupts data by performing lossy UTF-8 conversion on all output lines
(updated )
The comm utility in uutils coreutils silently corrupts data by performing lossy UTF-8 conversion on all output lines. The implementation uses String::from_utf8_lossy(), which replaces invalid UTF-8 byte sequences with the Unicode replacement character (U+FFFD). This behavior differs from GNU comm, which processes raw bytes and preserves the original input. This results in corrupted output when the utility is used to compare binary files or files using non-UTF-8 legacy encodings.
References
- github.com/advisories/GHSA-hwhf-8p2f-45wr
- github.com/uutils/coreutils
- github.com/uutils/coreutils/commit/b9372e509ea9b278fe13763237067a261bb8c946
- github.com/uutils/coreutils/issues/10192
- github.com/uutils/coreutils/pull/10206
- github.com/uutils/coreutils/releases/tag/0.6.0
- nvd.nist.gov/vuln/detail/CVE-2026-35346
Code Behaviors & Features
Detect and mitigate CVE-2026-35346 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →