Vulnerability Description
A logic error in the ln utility of uutils coreutils allows the utility to dereference a symbolic link target even when the --no-dereference (or -n) flag is explicitly provided. The implementation previously only honored the "no-dereference" intent if the --force (overwrite) mode was also enabled. This flaw causes ln to follow a symbolic link that points to a directory and create new links inside that target directory instead of treating the symbolic link itself as the destination. In environments where a privileged user or system script uses ln -n to update a symlink, a local attacker could manipulate existing symbolic links to redirect file creation into sensitive directories, potentially leading to unauthorized file creation or system misconfiguration.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Uutils | Coreutils | < 0.8.0 |
Related Weaknesses (CWE)
References
- https://github.com/uutils/coreutils/pull/11253Issue TrackingPatch
- https://github.com/uutils/coreutils/releases/tag/0.8.0Release Notes
FAQ
What is CVE-2026-35372?
CVE-2026-35372 is a vulnerability with a CVSS score of 5.0 (MEDIUM). A logic error in the ln utility of uutils coreutils allows the utility to dereference a symbolic link target even when the --no-dereference (or -n) flag is explicitly provided. The implementation prev...
How severe is CVE-2026-35372?
CVE-2026-35372 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-35372?
Check the references section above for vendor advisories and patch information. Affected products include: Uutils Coreutils.