Home

Description

The install utility in uutils coreutils is vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition during file installation. The implementation unlinks an existing destination file and then recreates it using a path-based operation without the O_EXCL flag. A local attacker can exploit the window between the unlink and the subsequent creation to swap the path with a symbolic link, allowing them to redirect privileged writes to overwrite arbitrary system files.

PUBLISHED Reserved 2026-04-02 | Published 2026-04-22 | Updated 2026-04-22 | Assigner canonical




MEDIUM: 6.3CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H

Problem types

CWE-367: Time-of-Check Time-of-Use (TOCTOU) Race Condition

Product status

Default status
unaffected

Any version before 0.6.0
affected

Credits

Zellic finder

References

github.com/uutils/coreutils/pull/10067 exploit

github.com/uutils/coreutils/pull/10067 issue-tracking patch

github.com/uutils/coreutils/releases/tag/0.6.0 vendor-advisory

cve.org (CVE-2026-35355)

nvd.nist.gov (CVE-2026-35355)

Download JSON