Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://github.com/uutils/coreutils/issues/9750 |
|
Wed, 22 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The cp utility in uutils coreutils fails to properly handle setuid and setgid bits when ownership preservation fails. When copying with the -p (preserve) flag, the utility applies the source mode bits even if the chown operation is unsuccessful. This can result in a user-owned copy retaining original privileged bits, creating unexpected privileged executables that violate local security policies. This differs from GNU cp, which clears these bits when ownership cannot be preserved. | |
| Title | uutils coreutils cp Unexpected Privileged Executable Creation with -p | |
| Weaknesses | CWE-281 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-22T17:58:14.456Z
Reserved: 2026-04-02T12:58:56.087Z
Link: CVE-2026-35350
Updated: 2026-04-22T17:56:10.952Z
Status : Awaiting Analysis
Published: 2026-04-22T17:16:37.327
Modified: 2026-04-22T21:23:52.620
Link: CVE-2026-35350
No data.
OpenCVE Enrichment
No data.