CVE-2026-35350

The cp utility in uutils coreutils fails to properly handle setuid and setgid bits when ownership preservation fails. When copying with the -p (preserve) flag, the utility applies the source mode bits even if the chown operation is unsuccessful. This can result in a user-owned copy retaining original privileged bits, creating unexpected privileged executables that violate local security policies. This differs from GNU cp, which clears these bits when ownership cannot be preserved.
References
Link Resource
https://github.com/uutils/coreutils/issues/9750 Exploit Issue Tracking Vendor Advisory
https://github.com/uutils/coreutils/issues/9750 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:uutils:coreutils:-:*:*:*:*:rust:*:*

History

24 Apr 2026, 19:04

Type Values Removed Values Added
First Time Uutils
Uutils coreutils
CPE cpe:2.3:a:uutils:coreutils:-:*:*:*:*:rust:*:*
References () https://github.com/uutils/coreutils/issues/9750 - () https://github.com/uutils/coreutils/issues/9750 - Exploit, Issue Tracking, Vendor Advisory

22 Apr 2026, 19:17

Type Values Removed Values Added
References () https://github.com/uutils/coreutils/issues/9750 - () https://github.com/uutils/coreutils/issues/9750 -

22 Apr 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-22 17:16

Updated : 2026-04-24 19:04


NVD link : CVE-2026-35350

Mitre link : CVE-2026-35350

CVE.ORG link : CVE-2026-35350


JSON object : View

Products Affected

uutils

  • coreutils
CWE
CWE-281

Improper Preservation of Permissions