Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 22 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An argument parsing error in the kill utility of uutils coreutils incorrectly interprets kill -1 as a request to send the default signal (SIGTERM) to PID -1. Sending a signal to PID -1 causes the kernel to terminate all processes visible to the caller, potentially leading to a system crash or massive process termination. This differs from GNU coreutils, which correctly recognizes -1 as a signal number in this context and would instead report a missing PID argument. | |
| Title | uutils coreutils kill System-wide Process Termination and Denial of Service via Argument Misinterpretation | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-22T17:48:32.873Z
Reserved: 2026-04-02T12:58:56.088Z
Link: CVE-2026-35369
Updated: 2026-04-22T17:48:30.050Z
Status : Awaiting Analysis
Published: 2026-04-22T17:16:40.687
Modified: 2026-04-22T21:23:52.620
Link: CVE-2026-35369
No data.
OpenCVE Enrichment
No data.