Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-q6m9-xj2w-xmrc | uutils coreutils has a Time-of-check Time-of-use (TOCTOU) Race Condition |
| Link | Providers |
|---|---|
| https://github.com/uutils/coreutils/issues/10019 |
|
Fri, 24 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Uutils
Uutils coreutils |
|
| CPEs | cpe:2.3:a:uutils:coreutils:-:*:*:*:*:rust:*:* | |
| Vendors & Products |
Uutils
Uutils coreutils |
Wed, 22 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The touch utility in uutils coreutils is vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition during file creation. When the utility identifies a missing path, it later attempts creation using File::create(), which internally uses O_TRUNC. An attacker can exploit this window to create a file or swap a symlink at the target path, causing touch to truncate an existing file and leading to permanent data loss. | |
| Title | uutils coreutils touch Arbitrary File Truncation via TOCTOU Race Condition | |
| Weaknesses | CWE-367 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-22T18:03:26.466Z
Reserved: 2026-04-02T12:58:56.088Z
Link: CVE-2026-35360
Updated: 2026-04-22T18:03:16.052Z
Status : Analyzed
Published: 2026-04-22T17:16:38.673
Modified: 2026-04-24T19:02:11.560
Link: CVE-2026-35360
No data.
OpenCVE Enrichment
Updated: 2026-04-28T08:00:14Z
Github GHSA