A Time-of-Check to Time-of-Use (TOCTOU) vulnerability in the cp utility of uutils coreutils allows an attacker to bypass no-dereference intent. The utility checks if a source path is a symbolic link using path-based metadata but subsequently opens it without the O_NOFOLLOW flag. An attacker with concurrent write access can swap a regular file for a symbolic link during this window, causing a privileged cp process to copy the contents of arbitrary sensitive files into a destination controlled by the attacker.
References
| Link | Resource |
|---|---|
| https://github.com/uutils/coreutils/issues/10017 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/uutils/coreutils/issues/10017 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
24 Apr 2026, 19:02
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/uutils/coreutils/issues/10017 - Exploit, Issue Tracking, Vendor Advisory | |
| CPE | cpe:2.3:a:uutils:coreutils:-:*:*:*:*:rust:*:* | |
| First Time |
Uutils
Uutils coreutils |
22 Apr 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/uutils/coreutils/issues/10017 - |
22 Apr 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-22 17:16
Updated : 2026-04-24 19:02
NVD link : CVE-2026-35359
Mitre link : CVE-2026-35359
CVE.ORG link : CVE-2026-35359
JSON object : View
Products Affected
uutils
- coreutils
