DEBIAN-CVE-2026-35339

Source
https://security-tracker.debian.org/tracker/CVE-2026-35339
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35339.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-35339
Upstream
  • CVE-2026-35339
Published
2026-04-23T00:03:14.124329Z
Modified
2026-04-23T04:07:37.335200Z
Summary
[none]
Details

The recursive mode (-R) of the chmod utility in uutils coreutils incorrectly handles exit codes when processing multiple files. The final return value is determined solely by the success or failure of the last file processed. This allows the command to return an exit code of 0 (success) even if errors were encountered on previous files, such as 'Operation not permitted'. Scripts relying on these exit codes may proceed under a false sense of success while sensitive files remain with restrictive or incorrect permissions.

References

Affected packages

Debian:12 / rust-coreutils

Package

Name
rust-coreutils
Purl
pkg:deb/debian/rust-coreutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.0.17-2
0.0.17-3
0.0.17-4
0.0.17-5
0.0.17-6
0.0.19-1
0.0.19-2
0.0.19-3
0.0.20-1
0.0.21-1
0.0.22-1
0.0.23-1
0.0.23-2
0.0.23-3
0.0.24-1
0.0.24-2
0.0.26-1
0.0.26-2
0.0.26-3
0.0.26-4
0.0.26-5
0.0.27-1
0.0.27-2
0.0.27-3
0.0.30-1
0.0.30-2
0.0.30-3~exp1
0.0.30-3
0.0.30-4
0.6.0-1
0.7.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35339.json"

Debian:13 / rust-coreutils

Package

Name
rust-coreutils
Purl
pkg:deb/debian/rust-coreutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.0.30-2
0.0.30-3~exp1
0.0.30-3
0.0.30-4
0.6.0-1
0.7.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35339.json"

Debian:14 / rust-coreutils

Package

Name
rust-coreutils
Purl
pkg:deb/debian/rust-coreutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.0.30-2
0.0.30-3~exp1
0.0.30-3
0.0.30-4
0.6.0-1
0.7.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35339.json"