top of page
perceptive_background_267k.jpg

A vulnerability exists in the chroot utility of uutils coreutils when using the --userspec option. The utility resolves the user specification via getpwnam() af…

Published:

21 april 2026 om 22:00:00

Alert date:

22 april 2026 om 18:02:07

Source:

nvd.nist.gov

Click to open the original link from this advisory

Operating Systems, Supply Chain & Dependencies

A vulnerability in the chroot utility of uutils coreutils allows privilege escalation when using the --userspec option. The utility resolves user specifications via getpwnam() after entering chroot but before dropping root privileges. On glibc-based systems, this triggers Name Service Switch (NSS) to load shared libraries from the new root directory. If NEWROOT is writable by an attacker, they can inject malicious NSS modules to execute arbitrary code as root, enabling container escape or privilege escalation.

Technical details

Mitigation steps:

Affected products:

uutils coreutils

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page