The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-35378

CVE-2026-35378: uutils coreutils expr Utility DOS Flaw

CVE-2026-35378 is a denial of service flaw in uutils coreutils expr utility caused by improper short-circuiting in logical operations. This causes script failures and premature termination. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: April 23, 2026

CVE-2026-35378 Overview

A logic error in the expr utility of uutils coreutils causes the program to evaluate parenthesized subexpressions during the parsing phase rather than at the execution phase. This implementation flaw prevents the utility from performing proper short-circuiting for logical OR (|) and AND (&) operations. As a result, arithmetic errors (such as division by zero) occurring within "dead" branches—branches that should be ignored due to short-circuiting—are raised as fatal errors. This divergence from GNU expr behavior can cause guarded expressions within shell scripts to fail with hard errors instead of returning expected boolean results, leading to premature script termination and breaking GNU-compatible shell control flow.

Critical Impact

Shell scripts relying on GNU-compatible expr short-circuit evaluation may experience unexpected termination when arithmetic errors occur in branches that should never be evaluated, breaking control flow logic in production environments.

Affected Products

  • uutils coreutils (versions prior to 0.8.0)

Discovery Timeline

  • 2026-04-22 - CVE CVE-2026-35378 published to NVD
  • 2026-04-22 - Last updated in NVD database

Technical Details for CVE-2026-35378

Vulnerability Analysis

This vulnerability stems from a logic error in how the uutils coreutils implementation of expr handles expression evaluation. Unlike the GNU implementation, the affected versions evaluate parenthesized subexpressions during the parsing phase rather than deferring evaluation to the execution phase.

In standard expr behavior, logical operators | (OR) and & (AND) should implement short-circuit evaluation. For example, in the expression 1 | ( 1 / 0 ), the right-hand side should never be evaluated because the left operand 1 already satisfies the OR condition. However, due to this implementation flaw, the division by zero in the parenthesized expression is evaluated during parsing, causing a fatal error before execution logic can apply short-circuiting.

This behavior divergence can cause scripts that work correctly with GNU coreutils to fail unexpectedly when run with uutils coreutils. The impact is particularly problematic for defensive programming patterns that rely on short-circuit evaluation to guard against potentially erroneous operations.

Root Cause

The root cause is classified under CWE-768 (Incorrect Short Circuit Evaluation). The implementation incorrectly processes parenthesized subexpressions at parse time, before the logical operators have an opportunity to short-circuit and skip evaluation of unnecessary branches. This architectural decision violates the expected evaluation order where short-circuit logic should prevent evaluation of "dead" code paths.

Attack Vector

The vulnerability requires local access to exploit. An attacker or a poorly written script could trigger unexpected application behavior by crafting expressions that contain arithmetic errors in branches that would normally be short-circuited. While this does not directly lead to code execution or data compromise, it can cause denial of service through script failures, potentially disrupting automated processes, build systems, or system administration scripts that depend on expr for conditional logic.

The exploitation scenario typically involves shell scripts containing guarded expressions like:

bash
# This should safely return 1 due to short-circuit evaluation
# but fails with division by zero error in affected versions
expr 1 '|' '(' 1 '/' 0 ')'

Detection Methods for CVE-2026-35378

Indicators of Compromise

  • Unexpected script termination with "division by zero" or similar arithmetic errors
  • Shell scripts that previously worked with GNU coreutils failing after switching to uutils coreutils
  • Error messages from expr indicating evaluation of expressions that should have been short-circuited

Detection Strategies

  • Audit shell scripts that use expr with logical operators (|, &) and parenthesized subexpressions containing potentially invalid arithmetic operations
  • Test critical shell scripts against both GNU coreutils and uutils coreutils to identify behavioral differences
  • Monitor system logs for unexpected expr utility failures in automated processes

Monitoring Recommendations

  • Implement logging for shell script failures, particularly those involving the expr utility
  • Review CI/CD pipelines and build systems that may use expr for conditional logic
  • Track uutils coreutils version deployments across infrastructure to identify systems requiring updates

How to Mitigate CVE-2026-35378

Immediate Actions Required

  • Upgrade uutils coreutils to version 0.8.0 or later, which contains the fix for this issue
  • Review shell scripts that depend on expr short-circuit evaluation for potential failures
  • Consider using alternative shell constructs (such as $(( )) arithmetic expansion or test/[ commands) that do not exhibit this issue

Patch Information

The fix for this vulnerability is available in uutils coreutils version 0.8.0. The patch addresses the expression evaluation order, ensuring parenthesized subexpressions are evaluated during the execution phase after short-circuit logic has been applied. For technical details on the fix, refer to the GitHub Pull Request #11395. The fixed version is available in the GitHub Release v0.8.0.

Workarounds

  • Replace expr usage with shell-native arithmetic evaluation where possible (e.g., $(( ... )) in bash/zsh)
  • Restructure scripts to avoid potentially erroneous operations in short-circuit branches
  • Use explicit conditional statements (if/then/else) instead of relying on expr short-circuit behavior for critical logic
  • Consider temporarily using GNU coreutils expr for scripts that require strict GNU compatibility
bash
# Workaround: Use shell arithmetic instead of expr
# Instead of: result=$(expr 1 '|' '(' 1 '/' 0 ')')
# Use:
if [ 1 -ne 0 ]; then
    result=1
else
    result=$((1 / 0))  # This branch won't be reached
fi

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechUutils Coreutils

  • SeverityLOW

  • CVSS Score3.3

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-768
  • Technical References
  • GitHub Pull Request

  • GitHub Release v0.8.0
  • Related CVEs
  • CVE-2026-35377: uutils coreutils env Utility DoS Flaw

  • CVE-2026-35369: uutils Coreutils DOS Vulnerability

  • CVE-2026-35373: uutils coreutils ln Utility DoS Vulnerability

  • CVE-2026-35365: uutils coreutils DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English