Home

Description

A Time-of-Check to Time-of-Use (TOCTOU) vulnerability in the cp utility of uutils coreutils allows an attacker to bypass no-dereference intent. The utility checks if a source path is a symbolic link using path-based metadata but subsequently opens it without the O_NOFOLLOW flag. An attacker with concurrent write access can swap a regular file for a symbolic link during this window, causing a privileged cp process to copy the contents of arbitrary sensitive files into a destination controlled by the attacker.

PUBLISHED Reserved 2026-04-02 | Published 2026-04-22 | Updated 2026-04-22 | Assigner canonical




MEDIUM: 4.7CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-367: Time-of-Check Time-of-Use (TOCTOU) Race Condition

CWE-59: Improper Link Resolution Before File Access ('Link Following')

Product status

Default status
affected

Credits

Zellic finder

References

github.com/uutils/coreutils/issues/10017 exploit

github.com/uutils/coreutils/issues/10017 issue-tracking

cve.org (CVE-2026-35359)

nvd.nist.gov (CVE-2026-35359)

Download JSON