CVE-2026-35349
⚪ Do wiadomości
Błąd w narzędziu rm w uutils coreutils pozwala na ominięcie ochrony przed usunięciem root.
CVSS
6.7
EPSS
0.0%
Exploit
none
Vendor
uutils
Opis źródłowy (NVD)
A vulnerability in the rm utility of uutils coreutils allows a bypass of the --preserve-root protection. The implementation uses a path-string check rather than comparing device and inode numbers to identify the root directory. An attacker or accidental user can bypass this safeguard by using a symbolic link that resolves to the root directory (e.g., /tmp/rootlink -> /), potentially leading to the unintended recursive deletion of the entire root filesystem.
brak
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 6.7 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-22 17:16:37 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-27 12:28:17 UTC |
Referencje
- https://github.com/uutils/coreutils/pull/9706 (security@ubuntu.com) [Issue Tracking, Patch]
- https://github.com/uutils/coreutils/releases/tag/0.7.0 (security@ubuntu.com) [Release Notes]