


Perceptive Security
SOC/SIEM Consultancy

A vulnerability exists in the chroot utility of uutils coreutils when using the --userspec option. The utility resolves the user specification via getpwnam() af…
Published:
21 April 2026 at 22:00:00
Alert date:
22 April 2026 at 18:02:07
Source:
nvd.nist.gov
Operating Systems, Supply Chain & Dependencies
A vulnerability in the chroot utility of uutils coreutils allows privilege escalation when using the --userspec option. The utility resolves user specifications via getpwnam() after entering chroot but before dropping root privileges. On glibc-based systems, this triggers Name Service Switch (NSS) to load shared libraries from the new root directory. If NEWROOT is writable by an attacker, they can inject malicious NSS modules to execute arbitrary code as root, enabling container escape or privilege escalation.
Technical details
Mitigation steps:
Affected products:
uutils coreutils
Related links:
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
