CVE-2026-35369 PUBLISHED

uutils coreutils kill System-wide Process Termination and Denial of Service via Argument Misinterpretation

Assigner: canonical
Reserved: 02.04.2026 Published: 22.04.2026 Updated: 22.04.2026

An argument parsing error in the kill utility of uutils coreutils incorrectly interprets kill -1 as a request to send the default signal (SIGTERM) to PID -1. Sending a signal to PID -1 causes the kernel to terminate all processes visible to the caller, potentially leading to a system crash or massive process termination. This differs from GNU coreutils, which correctly recognizes -1 as a signal number in this context and would instead report a missing PID argument.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS Score: 5.5

Product Status

Vendor Uutils
Product coreutils
Versions Default: unaffected
  • affected from 0 to 0.6.0 (excl.)

Credits

  • Zellic finder

References

Problem Types

  • CWE-20: Improper Input Validation CWE

Impacts

  • CAPEC-153: Input Data Manipulation