Description
A Time-of-Check to Time-of-Use (TOCTOU) vulnerability exists in the install utility of uutils coreutils when using the -D flag. The command creates parent directories and subsequently performs a second path resolution to create the target file, neither of which is anchored to a directory file descriptor. An attacker with concurrent write access can replace a path component with a symbolic link between these operations, redirecting the privileged write to an arbitrary file system location.
Published: 2026-04-22
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Overwrite
Action: Apply Patch
AI Analysis

Impact

The install command of uutils coreutils contains a TOCTOU race condition when the -D flag is used. The utility first creates parent directories and then performs a second path resolution to create the target file, with neither resolution tied to a directory file descriptor. This design allows an attacker with concurrent write access to replace a path component with a symbolic link between the two operations, causing the privileged write to occur at an arbitrary filesystem location. The effect is an arbitrary file overwrite, potentially enabling destructive changes or privilege escalation.

Affected Systems

The flaw affects the install utility in the uutils:coreutils package. No specific version range is given in the advisory, but the issue is present in the current releases cited (e.g. the pull request merged in release 0.7.0). The product is typically used on systems that provide a Unix‑like shell environment. Systems that run uutils coreutils and rely on install -D for file recreation are at risk.

Risk and Exploitability

The CVSS score is 6.3, indicating a medium severity. An EPSS score is not available, and the vulnerability is not listed in CISA's KEV catalog. The vulnerability requires the attacker to have the ability to perform concurrent writes on the same filesystem path, meaning local or privileged users can exploit it. Because the race occurs between directory creation and file creation, an attack would likely need a user who can create or modify a symbolic link in the path while another session runs install -D. No remote exploitation path is described in the provided data, so the attack vector is inferred to be local. The presence of a TOCTOU flaw suggests the risk may be elevated if an attacker gains temporary or shared write access.

Generated by OpenCVE AI on April 22, 2026 at 18:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade uutils coreutils to version 0.7.0 or later, where the TOCTOU race condition has been addressed.
  • Until updating is possible, avoid using the install utility with the -D flag in environments accessible to untrusted users or concurrent processes.
  • If an upgrade is not feasible, restrict or monitor symbolic link creation in directories used by the install command, and consider using safer file creation mechanisms or disabling symlink traversal for the involved users.

Generated by OpenCVE AI on April 22, 2026 at 18:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description A Time-of-Check to Time-of-Use (TOCTOU) vulnerability exists in the install utility of uutils coreutils when using the -D flag. The command creates parent directories and subsequently performs a second path resolution to create the target file, neither of which is anchored to a directory file descriptor. An attacker with concurrent write access can replace a path component with a symbolic link between these operations, redirecting the privileged write to an arbitrary file system location.
Title uutils coreutils install Arbitrary File Overwrite with -D via Path Component Symlink Race
Weaknesses CWE-367
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2026-04-22T18:00:14.133Z

Reserved: 2026-04-02T12:58:56.087Z

Link: CVE-2026-35356

cve-icon Vulnrichment

Updated: 2026-04-22T18:00:10.202Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-22T17:16:38.130

Modified: 2026-04-22T21:23:52.620

Link: CVE-2026-35356

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T18:15:15Z

Weaknesses