Description
A vulnerability in the tail utility of uutils coreutils allows for the exfiltration of sensitive file contents when using the --follow=name option. Unlike GNU tail, the uutils implementation continues to monitor a path after it has been replaced by a symbolic link, subsequently outputting the contents of the link's target. In environments where a privileged user (e.g., root) monitors a log directory, a local attacker with write access to that directory can replace a log file with a symlink to a sensitive system file (such as /etc/shadow), causing tail to disclose the contents of the sensitive file.
Published: 2026-04-22
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure via Symlink Race
Action: Apply Patch
AI Analysis

Impact

A flaw in the uutils coreutils tail utility causes information disclosure when the --follow=name option is used. The tool keeps monitoring a file path even after it is replaced by a symbolic link. Consequently, if an attacker replaces a log file with a symlink to a protected file such as /etc/shadow, tail will output the contents of that file. This allows a local attacker who can write to the monitored directory to exfiltrate sensitive data that otherwise would require privileged access.

Affected Systems

The vulnerability affects the tail command distributed by the Uutils coreutils project. No specific affected versions are disclosed. Anyone using uutils coreutils and running tail with the --follow=name flag in a privileged context is potentially impacted.

Risk and Exploitability

The CVSS score of 5.3 reflects a moderate risk. EPSS information is not available, so the likely exploitation probability cannot be quantified, but the flaw remains unlisted in CISA KEV catalog. The attack requires local write access to a directory that is monitored by a privileged tail instance. Once those conditions exist, the attacker can create a symlink to a sensitive file and trigger data disclosure. The risk is heightened when the victim runs tail as a privileged user monitoring log directories of sensitive system files.

Generated by OpenCVE AI on April 22, 2026 at 18:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest version of uutils coreutils where the race condition is fixed.
  • Restrict write permissions on log directories that are monitored by tail so that only trusted users can alter files in those paths.
  • Avoid using the --follow=name option with privileged instances of tail; instead use safer monitoring methods or disable the option entirely.

Generated by OpenCVE AI on April 22, 2026 at 18:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the tail utility of uutils coreutils allows for the exfiltration of sensitive file contents when using the --follow=name option. Unlike GNU tail, the uutils implementation continues to monitor a path after it has been replaced by a symbolic link, subsequently outputting the contents of the link's target. In environments where a privileged user (e.g., root) monitors a log directory, a local attacker with write access to that directory can replace a log file with a symlink to a sensitive system file (such as /etc/shadow), causing tail to disclose the contents of the sensitive file.
Title uutils coreutils tail Privileged Information Disclosure via Symlink Replacement Race
Weaknesses CWE-367
CWE-59
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2026-04-22T18:13:19.881Z

Reserved: 2026-04-02T12:58:56.087Z

Link: CVE-2026-35345

cve-icon Vulnrichment

Updated: 2026-04-22T18:12:52.165Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-22T17:16:36.627

Modified: 2026-04-22T21:23:52.620

Link: CVE-2026-35345

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T18:30:23Z

Weaknesses