Home

Description

The cp utility in uutils coreutils is vulnerable to an information disclosure race condition. Destination files are initially created with umask-derived permissions (e.g., 0644) before being restricted to their final mode (e.g., 0600) later in the process. A local attacker can race to open the file during this window; once obtained, the file descriptor remains valid and readable even after the permissions are tightened, exposing sensitive or private file contents.

PUBLISHED Reserved 2026-04-02 | Published 2026-04-22 | Updated 2026-04-22 | Assigner canonical




MEDIUM: 4.7CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-367: Time-of-Check Time-of-Use (TOCTOU) Race Condition

Product status

Default status
affected

Credits

Zellic finder

References

github.com/uutils/coreutils/issues/10011 exploit

github.com/uutils/coreutils/issues/10011 issue-tracking

cve.org (CVE-2026-35357)

nvd.nist.gov (CVE-2026-35357)

Download JSON