CVE-2026-35348

The sort utility in uutils coreutils is vulnerable to a process panic when using the --files0-from option with inputs containing non-UTF-8 filenames. The implementation enforces UTF-8 encoding and utilizes expect(), causing an immediate crash when encountering valid but non-UTF-8 paths. This diverges from GNU sort, which treats filenames as raw bytes. A local attacker can exploit this to crash the utility and disrupt automated pipelines.
References
Link Resource
https://github.com/uutils/coreutils/issues/9696 Exploit Issue Tracking Vendor Advisory
https://github.com/uutils/coreutils/issues/9696 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:uutils:coreutils:-:*:*:*:*:rust:*:*

History

24 Apr 2026, 18:57

Type Values Removed Values Added
References () https://github.com/uutils/coreutils/issues/9696 - () https://github.com/uutils/coreutils/issues/9696 - Exploit, Issue Tracking, Vendor Advisory
First Time Uutils
Uutils coreutils
CPE cpe:2.3:a:uutils:coreutils:-:*:*:*:*:rust:*:*

22 Apr 2026, 19:17

Type Values Removed Values Added
References () https://github.com/uutils/coreutils/issues/9696 - () https://github.com/uutils/coreutils/issues/9696 -

22 Apr 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-22 17:16

Updated : 2026-04-24 18:57


NVD link : CVE-2026-35348

Mitre link : CVE-2026-35348

CVE.ORG link : CVE-2026-35348


JSON object : View

Products Affected

uutils

  • coreutils
CWE
CWE-248

Uncaught Exception