CVE-2026-35355
Received Received - Intake
TOCTOU Race Condition in uutils coreutils install Allows Privilege Escalation

Publication date: 2026-04-22

Last updated on: 2026-04-27

Assigner: Canonical Ltd.

Description
The install utility in uutils coreutils is vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition during file installation. The implementation unlinks an existing destination file and then recreates it using a path-based operation without the O_EXCL flag. A local attacker can exploit the window between the unlink and the subsequent creation to swap the path with a symbolic link, allowing them to redirect privileged writes to overwrite arbitrary system files.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-22
Last Modified
2026-04-27
Generated
2026-05-06
AI Q&A
2026-04-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
uutils coreutils to 0.6.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-367 The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the install utility of uutils coreutils and is a Time-of-Check to Time-of-Use (TOCTOU) race condition during file installation.

The utility first unlinks (deletes) an existing destination file and then recreates it without using the O_EXCL flag, which is meant to prevent race conditions.

Because of this, a local attacker can exploit the time window between the unlinking and the file creation by swapping the intended file path with a symbolic link.

This allows the attacker to redirect privileged writes to overwrite arbitrary system files.


How can this vulnerability impact me? :

This vulnerability can allow a local attacker to overwrite arbitrary system files with privileged writes.

Such unauthorized overwriting can lead to system compromise, including potential privilege escalation or disruption of system operations.

The CVSS score of 6.3 indicates a medium severity impact, with high impact on integrity and availability.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is a local Time-Of-Check to Time-Of-Use (TOCTOU) race condition in the `install` utility of uutils coreutils, which involves file operations and symbolic link manipulation.

Detection involves checking if the vulnerable version of the `install` utility is present and potentially testing for the race condition by attempting to exploit the window between unlinking and file creation.

A practical approach includes verifying the version of uutils coreutils installed and running tests similar to the one added in the fix, such as `test_install_replaces_symlink()`, which checks if the `install` command follows symlinks during file replacement.

While no specific commands are provided, you can check the version of the `install` utility with commands like `install --version` or by inspecting the package version of uutils coreutils.

Additionally, manual testing based on the exploit scenario (e.g., creating a symlink and attempting to replace a file using `install`) can help detect if the vulnerability exists.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to update the `install` utility in uutils coreutils to a version that includes the fix for CVE-2026-35355.

The fix involves using atomic file creation with the `O_EXCL` flag to prevent the TOCTOU race condition and symlink exploitation.

Until the update is applied, avoid running the vulnerable `install` utility in untrusted or multi-user environments where local attackers could exploit the race condition.

Review and apply the patch from Pull Request #10067 or upgrade to a version of uutils coreutils released after January 17, 2026, when the fix was merged.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The CVE-2026-35355 vulnerability allows a local attacker to exploit a race condition to overwrite arbitrary system files by redirecting privileged writes through symbolic links. This could lead to unauthorized modification of system files, potentially compromising system integrity and security.

Such unauthorized file modifications can impact compliance with standards and regulations like GDPR and HIPAA, which require maintaining the confidentiality, integrity, and availability of sensitive data and systems. If exploited, this vulnerability could undermine these requirements by enabling privilege escalation or unauthorized changes to critical files.

However, the vulnerability is local and requires low privileges but high attack complexity, and it does not directly disclose data (no confidentiality impact). The fix implemented enforces atomic file creation to prevent exploitation, thereby helping to maintain compliance by protecting system integrity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart