Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2026-35344
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
uutils coreutils dd Silent Data Corruption via Unconditional Truncation Error Suppression
Source: NVD (National Vulnerability Database)
Vulnerability Description
The dd utility in uutils coreutils suppresses errors during file truncation operations by unconditionally calling Result::ok() on truncation attempts. While intended to mimic GNU behavior for special files like /dev/null, the uutils implementation also hides failures on regular files and directories caused by full disks or read-only file systems. This can lead to silent data corruption in backup or migration scripts, as the utility may report a successful operation even when the destination file contains old or garbage data.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
未加检查的返回值
Source: NVD (National Vulnerability Database)
Vulnerability Title
uutils coreutils 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
uutils coreutils是Uutils开源的一个跨平台核心命令行工具集。 uutils coreutils存在安全漏洞,该漏洞源于dd实用程序通过无条件调用Result::ok来抑制文件截断操作期间的错误,虽然旨在模仿GNU对特殊文件的行为,但uutils实现也隐藏了常规文件和目录上因磁盘已满或只读文件系统引起的故障,可能导致备份或迁移脚本中的静默数据损坏,因为实用程序可能报告操作成功,即使目标文件包含旧数据或垃圾数据。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Uutilscoreutils--
II. Public POCs for CVE-2026-35344
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2026-35344
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2026-35344

No comments yet


Leave a comment