PT-2026-34485 · Unknown · Uutils Coreutils
Zellic
·
Published
2026-04-22
·
Updated
2026-04-22
·
CVE-2026-35349
CVSS v3.1
6.7
Medium
| AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
uutils coreutils (affected versions not specified)
Description
A flaw in the rm utility allows a bypass of the --preserve-root protection. The system uses a path-string check instead of comparing device and inode numbers to identify the root directory. This allows a user to bypass the safeguard by using a symbolic link that resolves to the root directory, which could lead to the recursive deletion of the entire root filesystem.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Link Following
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Uutils Coreutils