CVE-2026-35374
Received Received - Intake
TOCTOU Vulnerability in uutils coreutils split Causes Data Loss

Publication date: 2026-04-22

Last updated on: 2026-05-04

Assigner: Canonical Ltd.

Description
A Time-of-Check to Time-of-Use (TOCTOU) vulnerability exists in the split utility of uutils coreutils. The program attempts to prevent data loss by checking for identity between input and output files using their file paths before initiating the split operation. However, the utility subsequently opens the output file with truncation after this path-based validation is complete. A local attacker with write access to the directory can exploit this race window by manipulating mutable path components (e.g., swapping a path with a symbolic link). This can cause split to truncate and write to an unintended target file, potentially including the input file itself or other sensitive files accessible to the process, leading to permanent data loss.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-22
Last Modified
2026-05-04
Generated
2026-05-07
AI Q&A
2026-04-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
uutils coreutils *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-367 The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in the split utility can lead to unintended data loss or corruption by allowing an attacker to cause the utility to truncate or write to files other than the intended target. This could potentially include sensitive files accessible by the process.

Such unintended data loss or corruption of sensitive files may impact compliance with data protection standards and regulations like GDPR or HIPAA, which require the protection and integrity of personal and sensitive data.

However, the provided information does not explicitly discuss compliance implications or how this vulnerability directly affects adherence to these standards.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the CVE-2026-35374 vulnerability in the split utility of uutils coreutils, you should update to the fixed version where the race condition has been addressed. The fix involves hardening the output file open path by changing the order and method of checks and file opening to close the race window that allows malicious file swaps.

This update prevents the split utility from truncating or writing to unintended target files by ensuring the file being truncated and written to is the intended target.


Can you explain this vulnerability to me?

This vulnerability is a Time-of-Check to Time-of-Use (TOCTOU) issue in the split utility of uutils coreutils. The program tries to prevent data loss by verifying that the input and output files are the same before starting the split operation, based on their file paths. However, after this check, it opens the output file with truncation, which can be exploited by a local attacker who has write access to the directory. The attacker can manipulate the file path, for example by swapping it with a symbolic link, during the small time window between the check and the use. This can cause the split utility to truncate and write to an unintended file, potentially including the input file or other sensitive files accessible to the process.


How can this vulnerability impact me? :

This vulnerability can lead to permanent data loss because the split utility might truncate and overwrite unintended files. An attacker with local write access to the directory can exploit this to cause damage by redirecting the output to critical or sensitive files, including the input file itself or other files accessible by the process.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is a local Time-Of-Check to Time-Of-Use (TOCTOU) race condition in the split utility of uutils coreutils, which can be exploited by a local attacker with write access to the directory containing the output file. Detection involves verifying whether the installed version of the split utility is vulnerable or has been patched.

To detect if your system is vulnerable, you can check the version of the uutils coreutils package and see if it includes the fix from pull request #11401. Since this is a local race condition, network detection is not applicable.

Suggested commands to help detect or mitigate the vulnerability include:

  • Check the version of uutils coreutils installed: `split --version` or check package manager info.
  • Review if the installed version includes the fix by comparing the version or patch level against the one that merged pull request #11401.
  • Monitor file system activity for suspicious symbolic link swaps or unexpected truncations in directories where split is used.
  • Use file integrity monitoring tools to detect unexpected changes to sensitive files that could result from exploitation.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart