Home

Description

The cp utility in uutils coreutils fails to properly handle setuid and setgid bits when ownership preservation fails. When copying with the -p (preserve) flag, the utility applies the source mode bits even if the chown operation is unsuccessful. This can result in a user-owned copy retaining original privileged bits, creating unexpected privileged executables that violate local security policies. This differs from GNU cp, which clears these bits when ownership cannot be preserved.

PUBLISHED Reserved 2026-04-02 | Published 2026-04-22 | Updated 2026-04-22 | Assigner canonical




MEDIUM: 6.6CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L

Problem types

CWE-281: Improper Preservation of Permissions

Product status

Default status
affected

Credits

Zellic finder

References

github.com/uutils/coreutils/issues/9750 exploit

github.com/uutils/coreutils/issues/9750 issue-tracking

cve.org (CVE-2026-35350)

nvd.nist.gov (CVE-2026-35350)

Download JSON