Vulnerability Description
A logic error in the expr utility of uutils coreutils causes the program to evaluate parenthesized subexpressions during the parsing phase rather than at the execution phase. This implementation flaw prevents the utility from performing proper short-circuiting for logical OR (|) and AND (&) operations. As a result, arithmetic errors (such as division by zero) occurring within "dead" branches, branches that should be ignored due to short-circuiting, are raised as fatal errors. This divergence from GNU expr behavior can cause guarded expressions within shell scripts to fail with hard errors instead of returning expected boolean results, leading to premature script termination and breaking GNU-compatible shell control flow.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Uutils | Coreutils | < 0.8.0 |
Related Weaknesses (CWE)
References
- https://github.com/uutils/coreutils/pull/11395ExploitIssue TrackingPatch
- https://github.com/uutils/coreutils/releases/tag/0.8.0Release Notes
FAQ
What is CVE-2026-35378?
CVE-2026-35378 is a vulnerability with a CVSS score of 3.3 (LOW). A logic error in the expr utility of uutils coreutils causes the program to evaluate parenthesized subexpressions during the parsing phase rather than at the execution phase. This implementation flaw ...
How severe is CVE-2026-35378?
CVE-2026-35378 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-35378?
Check the references section above for vendor advisories and patch information. Affected products include: Uutils Coreutils.