Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. coreutils
  4. ›
  5. CVE-2026-35368

CVE-2026-35368: uutils coreutils has an Untrusted Search Path

April 22, 2026 (updated April 30, 2026)

A vulnerability exists in the chroot utility of uutils coreutils when using the –userspec option. The utility resolves the user specification via getpwnam() after entering the chroot but before dropping root privileges. On glibc-based systems, this can trigger the Name Service Switch (NSS) to load shared libraries (e.g., libnss_*.so.2) from the new root directory. If the NEWROOT is writable by an attacker, they can inject a malicious NSS module to execute arbitrary code as root, facilitating a full container escape or privilege escalation.

References

  • github.com/advisories/GHSA-mh5c-xrmh-m794
  • github.com/uutils/coreutils
  • github.com/uutils/coreutils/issues/10327
  • nvd.nist.gov/vuln/detail/CVE-2026-35368

Code Behaviors & Features

Detect and mitigate CVE-2026-35368 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 0.8.0

Solution

Unfortunately, there is no solution available yet.

Impact 7.8 HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-426: Untrusted Search Path

Source file

cargo/coreutils/CVE-2026-35368.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:20:19 +0000.