Bug 2460806 (CVE-2026-35372) - CVE-2026-35372 rust-coreutils: ln: security bypass via improper handling of the --no-dereference flag
Summary: CVE-2026-35372 rust-coreutils: ln: security bypass via improper handling of t...
Keywords:
Status: NEW
Alias: CVE-2026-35372
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2461184 2461185
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-22 17:03 UTC by OSIDB Bzimport
Modified: 2026-04-24 19:03 UTC (History)
8 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-22 17:03:46 UTC
A logic error in the ln utility of uutils coreutils allows the utility to dereference a symbolic link target even when the --no-dereference (or -n) flag is explicitly provided. The implementation previously only honored the "no-dereference" intent if the --force (overwrite) mode was also enabled. This flaw causes ln to follow a symbolic link that points to a directory and create new links inside that target directory instead of treating the symbolic link itself as the destination. In environments where a privileged user or system script uses ln -n to update a symlink, a local attacker could manipulate existing symbolic links to redirect file creation into sensitive directories, potentially leading to unauthorized file creation or system misconfiguration.


Note You need to log in before you can comment on or make changes to this bug.