Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-ggc5-46rg-mr4v | uutils coreutils has a Time-of-check Time-of-use (TOCTOU) Race Condition |
Mon, 27 Apr 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Uutils
Uutils coreutils |
|
| CPEs | cpe:2.3:a:uutils:coreutils:*:*:*:*:*:rust:*:* | |
| Vendors & Products |
Uutils
Uutils coreutils |
Wed, 22 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The safe_traversal module in uutils coreutils, which provides protection against Time-of-Check to Time-of-Use (TOCTOU) symlink races using file-descriptor-relative syscalls, is incorrectly limited to Linux targets. On other Unix-like systems such as macOS and FreeBSD, the utility fails to utilize these protections, leaving directory traversal operations vulnerable to symlink race conditions. | |
| Title | uutils coreutils Missing TOCTOU Protection on Non-Linux Unix Platforms in Safe Traversal Module | |
| Weaknesses | CWE-367 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-22T17:28:40.509Z
Reserved: 2026-04-02T12:58:56.088Z
Link: CVE-2026-35362
Updated: 2026-04-22T17:28:37.362Z
Status : Analyzed
Published: 2026-04-22T17:16:38.960
Modified: 2026-04-27T12:26:40.533
Link: CVE-2026-35362
No data.
OpenCVE Enrichment
Updated: 2026-04-28T20:45:16Z
Github GHSA