Medium severity4.7NVD Advisory· Published Apr 22, 2026· Updated Apr 24, 2026
CVE-2026-35359
CVE-2026-35359
Description
A Time-of-Check to Time-of-Use (TOCTOU) vulnerability in the cp utility of uutils coreutils allows an attacker to bypass no-dereference intent. The utility checks if a source path is a symbolic link using path-based metadata but subsequently opens it without the O_NOFOLLOW flag. An attacker with concurrent write access can swap a regular file for a symbolic link during this window, causing a privileged cp process to copy the contents of arbitrary sensitive files into a destination controlled by the attacker.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
coreutilscrates.io | <= 0.8.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/uutils/coreutils/issues/10017nvdExploitIssue TrackingVendor AdvisoryWEB
- github.com/advisories/GHSA-hpfw-mqm3-33jhghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-35359ghsaADVISORY
News mentions
0No linked articles in our index yet.