Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vf87-345h-9qhx | uutils coreutils has a Time-of-check Time-of-use (TOCTOU) Race Condition |
Mon, 27 Apr 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Uutils
Uutils coreutils |
|
| CPEs | cpe:2.3:a:uutils:coreutils:*:*:*:*:*:rust:*:* | |
| Vendors & Products |
Uutils
Uutils coreutils |
Wed, 22 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The mkdir utility in uutils coreutils incorrectly applies permissions when using the -m flag by creating a directory with umask-derived permissions (typically 0755) before subsequently changing them to the requested mode via a separate chmod system call. In multi-user environments, this introduces a brief window where a directory intended to be private is accessible to other users, potentially leading to unauthorized data access. | |
| Title | uutils coreutils mkdir Permission Exposure Race Condition with -m | |
| Weaknesses | CWE-367 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-22T17:49:45.259Z
Reserved: 2026-04-02T12:58:56.087Z
Link: CVE-2026-35353
Updated: 2026-04-22T17:40:52.211Z
Status : Analyzed
Published: 2026-04-22T17:16:37.723
Modified: 2026-04-27T12:27:39.040
Link: CVE-2026-35353
No data.
OpenCVE Enrichment
Updated: 2026-04-28T08:15:23Z
Github GHSA