Description
The mktemp utility in uutils coreutils fails to properly handle an empty TMPDIR environment variable. Unlike GNU mktemp, which falls back to /tmp when TMPDIR is an empty string, the uutils implementation treats the empty string as a valid path. This causes temporary files to be created in the current working directory (CWD) instead of the intended secure temporary directory. If the CWD is more permissive or accessible to other users than /tmp, it may lead to unintended information disclosure or unauthorized access to temporary data.
Published: 2026-04-22
Score: 3.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

The mktemp tool in the uutils coreutils suite incorrectly handles an empty TMPDIR environment variable. Unlike the GNU implementation that defaults to /tmp, the uutils version treats the empty string as a literal path and creates temporary files in the current working directory. Because the working directory may have more permissive permissions than the system temporary directory, the temporary data could become visible or editable by other users, leading to unintended information disclosure or unauthorized access.

Affected Systems

The vulnerability affects the mktemp utility in the uutils coreutils collection. No specific version range is documented by the CNA, but the referenced release 0.6.0 includes the remediation. Administrators should target the uutils coreutils package when assessing deployments.

Risk and Exploitability

The CVSS score is 3.3, indicating low overall impact. The EPSS score is unavailable and the vulnerability is not listed in the CISA KEV catalog, suggesting limited public exploitation. Because creating temporary files requires local user execution, the attack vector is most likely local. An attacker who can run mktemp or influence the TMPDIR environment could cause temporary files to be written to a directory with looser permissions, exposing or allowing modification of temporary data. The risk remains modest, but patching mitigates the potential for local information leakage.

Generated by OpenCVE AI on April 22, 2026 at 18:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the uutils coreutils package to version 0.6.0 or later, which contains a fix that properly handles empty TMPDIR values.
  • Configure TMPDIR to a secure, writable directory such as /tmp, and avoid leaving the variable empty; consider unsetting TMPDIR to trigger the fallback behavior.
  • If upgrading is not yet possible, set TMPDIR explicitly at runtime or use a wrapper script to ensure temporary files are created in a safe directory.

Generated by OpenCVE AI on April 22, 2026 at 18:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description The mktemp utility in uutils coreutils fails to properly handle an empty TMPDIR environment variable. Unlike GNU mktemp, which falls back to /tmp when TMPDIR is an empty string, the uutils implementation treats the empty string as a valid path. This causes temporary files to be created in the current working directory (CWD) instead of the intended secure temporary directory. If the CWD is more permissive or accessible to other users than /tmp, it may lead to unintended information disclosure or unauthorized access to temporary data.
Title uutils coreutils mktemp Insecure Temporary File Placement via Empty TMPDIR
Weaknesses CWE-377
References
Metrics cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2026-04-22T18:15:53.932Z

Reserved: 2026-04-02T12:58:56.087Z

Link: CVE-2026-35342

cve-icon Vulnrichment

Updated: 2026-04-22T18:15:49.984Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-22T17:16:36.217

Modified: 2026-04-22T21:23:52.620

Link: CVE-2026-35342

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T18:30:23Z

Weaknesses