Impact
The dd utility in uutils coreutils suppresses errors during file truncation by unconditionally treating the operation as successful. This behavior unintentionally hides failures on regular files and directories caused by full disks or read‑only file systems. The result is that scripts performing backups or migrations may report success while the destination file remains unchanged or contains garbage, leading to silent data corruption that can compromise backup integrity and system state.
Affected Systems
The vulnerability affects the uutils coreutils package, specifically its dd component. Version information is not disclosed, so all releases of uutils coreutils that include the current dd implementation are potentially impacted.
Risk and Exploitability
The CVSS score of 3.3 indicates low overall severity, and the EPSS score is not available. This issue is not listed in the CISA KEV catalog. The vulnerability is discovered in a local utility, so the attack vector is likely local or requires privileged execution, such as a compromised user running backup scripts.
OpenCVE Enrichment