A Time-of-Check to Time-of-Use (TOCTOU) vulnerability exists in the install utility of uutils coreutils when using the -D flag. The command creates parent directories and subsequently performs a second path resolution to create the target file, neither of which is anchored to a directory file descriptor. An attacker with concurrent write access can replace a path component with a symbolic link between these operations, redirecting the privileged write to an arbitrary file system location.
References
| Link | Resource |
|---|---|
| https://github.com/uutils/coreutils/pull/10140 | Issue Tracking Patch |
| https://github.com/uutils/coreutils/releases/tag/0.7.0 | Release Notes |
Configurations
History
27 Apr 2026, 12:27
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/uutils/coreutils/pull/10140 - Issue Tracking, Patch | |
| References | () https://github.com/uutils/coreutils/releases/tag/0.7.0 - Release Notes | |
| First Time |
Uutils
Uutils coreutils |
|
| CPE | cpe:2.3:a:uutils:coreutils:*:*:*:*:*:rust:*:* |
22 Apr 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-22 17:16
Updated : 2026-04-27 12:27
NVD link : CVE-2026-35356
Mitre link : CVE-2026-35356
CVE.ORG link : CVE-2026-35356
JSON object : View
Products Affected
uutils
- coreutils
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
