The cp utility in uutils coreutils fails to properly handle setuid and setgid bits when ownership preservation fails. When copying with the -p (preserve) flag, the utility applies the source mode bits even if the chown operation is unsuccessful. This can result in a user-owned copy retaining original privileged bits, creating unexpected privileged executables that violate local security policies. This differs from GNU cp, which clears these bits when ownership cannot be preserved.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/uutils/coreutils/issues/9750 |
|
History
Wed, 22 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The cp utility in uutils coreutils fails to properly handle setuid and setgid bits when ownership preservation fails. When copying with the -p (preserve) flag, the utility applies the source mode bits even if the chown operation is unsuccessful. This can result in a user-owned copy retaining original privileged bits, creating unexpected privileged executables that violate local security policies. This differs from GNU cp, which clears these bits when ownership cannot be preserved. | |
| Title | uutils coreutils cp Unexpected Privileged Executable Creation with -p | |
| Weaknesses | CWE-281 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-22T17:58:14.456Z
Reserved: 2026-04-02T12:58:56.087Z
Link: CVE-2026-35350
Updated: 2026-04-22T17:56:10.952Z
Status : Awaiting Analysis
Published: 2026-04-22T17:16:37.327
Modified: 2026-04-22T21:23:52.620
Link: CVE-2026-35350
No data.
OpenCVE Enrichment
No data.