Bug 2460777 (CVE-2026-35368) - CVE-2026-35368 rust-coreutils: uutils coreutils: Privilege escalation and arbitrary code execution in chroot utility
Summary: CVE-2026-35368 rust-coreutils: uutils coreutils: Privilege escalation and arb...
Keywords:
Status: NEW
Alias: CVE-2026-35368
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2463770 2463771
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-22 17:02 UTC by OSIDB Bzimport
Modified: 2026-04-29 09:59 UTC (History)
8 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-22 17:02:07 UTC
A vulnerability exists in the chroot utility of uutils coreutils when using the --userspec option. The utility resolves the user specification via getpwnam() after entering the chroot but before dropping root privileges. On glibc-based systems, this can trigger the Name Service Switch (NSS) to load shared libraries (e.g., libnss_*.so.2) from the new root directory. If the NEWROOT is writable by an attacker, they can inject a malicious NSS module to execute arbitrary code as root, facilitating a full container escape or privilege escalation.


Note You need to log in before you can comment on or make changes to this bug.