logoalt Hacker News

throwa356262today at 6:29 AM3 repliesview on HN

That was a lot of CVEs

Goes to show that not all security bugs are memory related bugs


Replies

sphtoday at 7:47 AM

Not aimed at you but... no sh*t. The "Rewrite it in Rust" community never heard of the second-system effect.

I'd rather use something written in a crappier language that has been battle-tested for decades, personally.

show 2 replies
nine_ktoday at 7:06 AM

Indeed, many bugs are API usage bugs, something that no language can verify. (The API is implemented in C anyway.)

show 1 reply
IshKebabtoday at 7:46 AM

I wish they'd put the severity. There are 4 highs, the rest are medium or low. Here are the high ones:

https://www.cve.org/CVERecord?id=CVE-2026-35338 - `chmod --preserve-root` can be bypassed. That doesn't seem that bad tbh.

https://www.cve.org/CVERecord?id=CVE-2026-35341 - `mkfifo` accidentally resets the permissions of files that already exist, so if you manage to do `sudo mkfifo /etc/shadow` then it becomes world readable.

https://www.cve.org/CVERecord?id=CVE-2026-35352 - TOCTOU in `mkfifo` lets you do the symlink trick to get it to change permissions on an unrelated file.

https://www.cve.org/CVERecord?id=CVE-2026-35368 - You might be able to get chroot to execute arbitrary code.

Tbh I doubt if any of these would ever result in a real hack, unless your system is doing really mental things like running shell scripts with untrusted input.

I could only find a couple of CVEs that looked actually serious for GNU Coreutils too though. IMO if you're using these tools with untrusted input your system is janky enough that there are going to be serious flaws in it anyway. Probably though quoting mistakes.

show 2 replies