High severity7.8NVD Advisory· Published Apr 22, 2026· Updated Apr 24, 2026
CVE-2026-35368
CVE-2026-35368
Description
A vulnerability exists in the chroot utility of uutils coreutils when using the --userspec option. The utility resolves the user specification via getpwnam() after entering the chroot but before dropping root privileges. On glibc-based systems, this can trigger the Name Service Switch (NSS) to load shared libraries (e.g., libnss_*.so.2) from the new root directory. If the NEWROOT is writable by an attacker, they can inject a malicious NSS module to execute arbitrary code as root, facilitating a full container escape or privilege escalation.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
coreutilscrates.io | <= 0.8.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/uutils/coreutils/issues/10327nvdExploitIssue TrackingVendor AdvisoryWEB
- github.com/advisories/GHSA-mh5c-xrmh-m794ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-35368ghsaADVISORY
News mentions
0No linked articles in our index yet.