Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hpfw-mqm3-33jh | uutils coreutils has a Link Following issue |
| Link | Providers |
|---|---|
| https://github.com/uutils/coreutils/issues/10017 |
|
Fri, 24 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Uutils
Uutils coreutils |
|
| CPEs | cpe:2.3:a:uutils:coreutils:-:*:*:*:*:rust:*:* | |
| Vendors & Products |
Uutils
Uutils coreutils |
Wed, 22 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Time-of-Check to Time-of-Use (TOCTOU) vulnerability in the cp utility of uutils coreutils allows an attacker to bypass no-dereference intent. The utility checks if a source path is a symbolic link using path-based metadata but subsequently opens it without the O_NOFOLLOW flag. An attacker with concurrent write access can swap a regular file for a symbolic link during this window, causing a privileged cp process to copy the contents of arbitrary sensitive files into a destination controlled by the attacker. | |
| Title | uutils coreutils cp Information Disclosure via Time-of-Check to Time-of-Use Symlink Swap | |
| Weaknesses | CWE-367 CWE-59 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-22T17:50:54.548Z
Reserved: 2026-04-02T12:58:56.087Z
Link: CVE-2026-35359
Updated: 2026-04-22T17:50:44.706Z
Status : Analyzed
Published: 2026-04-22T17:16:38.537
Modified: 2026-04-24T19:02:25.720
Link: CVE-2026-35359
No data.
OpenCVE Enrichment
Updated: 2026-04-28T08:15:23Z
Github GHSA