Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-35343
PUBLISHED
More InfoOfficial Page
Assigner-canonical
Assigner Org ID-cc1ad9ee-3454-478d-9317-d3e869d708bc
View Known Exploited Vulnerability (KEV) details
Published At-22 Apr, 2026 | 16:07
Updated At-22 Apr, 2026 | 18:05
Rejected At-
▼CVE Numbering Authority (CNA)
uutils coreutils cut Inconsistent Output Suppression with Newline Delimiters

The cut utility in uutils coreutils incorrectly handles the -s (only-delimited) option when a newline character is specified as the delimiter. The implementation fails to verify the only_delimited flag in the cut_fields_newline_char_delim function, causing the utility to print non-delimited lines that should have been suppressed. This can lead to unexpected data being passed to downstream scripts that rely on strict output filtering.

Affected Products
Vendor
Uutils
Product
coreutils
Collection URL
https://github.com/uutils
Package Name
coreutils
Repo
https://github.com/uutils/coreutils
Platforms
  • Linux
  • Unix
  • macOS
Default Status
unaffected
Versions
Affected
  • From 0 before 0.8.0 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-670CWE-670: Always-Incorrect Control Flow Implementation
Type: CWE
CWE ID: CWE-670
Description: CWE-670: Always-Incorrect Control Flow Implementation
Metrics
VersionBase scoreBase severityVector
3.13.3LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Version: 3.1
Base score: 3.3
Base severity: LOW
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-153CAPEC-153: Input Data Manipulation
CAPEC ID: CAPEC-153
Description: CAPEC-153: Input Data Manipulation
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Zellic
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/uutils/coreutils/pull/11143
patch
issue-tracking
https://github.com/uutils/coreutils/releases/tag/0.7.0
vendor-advisory
Hyperlink: https://github.com/uutils/coreutils/pull/11143
Resource:
patch
issue-tracking
Hyperlink: https://github.com/uutils/coreutils/releases/tag/0.7.0
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found