Vulnerability Description
A vulnerability in the chmod utility of uutils coreutils allows users to bypass the --preserve-root safety mechanism. The implementation only validates if the target path is literally / and does not canonicalize the path. An attacker or accidental user can use path variants such as /../ or symbolic links to execute destructive recursive operations (e.g., chmod -R 000) on the entire root filesystem, leading to system-wide permission loss and potential complete system breakdown.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Uutils | Coreutils | < 0.6.0 |
Related Weaknesses (CWE)
References
- https://github.com/uutils/coreutils/pull/10033Issue TrackingPatch
- https://github.com/uutils/coreutils/releases/tag/0.6.0Release Notes
FAQ
What is CVE-2026-35338?
CVE-2026-35338 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability in the chmod utility of uutils coreutils allows users to bypass the --preserve-root safety mechanism. The implementation only validates if the target path is literally / and does not c...
How severe is CVE-2026-35338?
CVE-2026-35338 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-35338?
Check the references section above for vendor advisories and patch information. Affected products include: Uutils Coreutils.