6.6

CVSS3.1

CVE-2026-35365 - uutils coreutils mv Denial of Service and Data Duplication via Improper Symlink Expansion

The mv utility in uutils coreutils improperly handles directory trees containing symbolic links during moves across filesystem boundaries. Instead of preserving symlinks, the implementation expands them, copying the linked targets as real files or directories at the destination. This can lead to re…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 22, 2026, 9:23 p.m.

6.3

CVSS3.1

CVE-2026-35364 - uutils coreutils mv Arbitrary File Overwrite via Cross-Device TOCTOU Race Condition

A Time-of-Check to Time-of-Use (TOCTOU) race condition exists in the mv utility of uutils coreutils during cross-device operations. The utility removes the destination path before recreating it through a copy operation. A local attacker with write access to the destination directory can exploit thi…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 24, 2026, 7:19 p.m.

5.6

CVSS3.1

CVE-2026-35363 - uutils coreutils rm Safeguard Bypass via Improper Path Normalization

A vulnerability in the rm utility of uutils coreutils allows the bypass of safeguard mechanisms intended to protect the current directory. While the utility correctly refuses to delete . or .., it fails to recognize equivalent paths with trailing slashes, such as ./ or .///. An accidental or malici…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 24, 2026, 7:02 p.m.

3.6

CVSS3.1

CVE-2026-35362 - uutils coreutils Missing TOCTOU Protection on Non-Linux Unix Platforms in Safe Traversal Module

The safe_traversal module in uutils coreutils, which provides protection against Time-of-Check to Time-of-Use (TOCTOU) symlink races using file-descriptor-relative syscalls, is incorrectly limited to Linux targets. On other Unix-like systems such as macOS and FreeBSD, the utility fails to utilize t…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 27, 2026, 12:26 p.m.

3.4

CVSS3.1

CVE-2026-35361 - uutils coreutils mknod Security Label Inconsistency and Broken Cleanup on SELinux Systems

The mknod utility in uutils coreutils fails to handle security labels atomically by creating device nodes before setting the SELinux context. If labeling fails, the utility attempts cleanup using std::fs::remove_dir, which cannot remove device nodes or FIFOs. This leaves mislabeled nodes behind wit…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 27, 2026, 12:27 p.m.

6.3

CVSS3.1

CVE-2026-35360 - uutils coreutils touch Arbitrary File Truncation via TOCTOU Race Condition

The touch utility in uutils coreutils is vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition during file creation. When the utility identifies a missing path, it later attempts creation using File::create(), which internally uses O_TRUNC. An attacker can exploit this window to crea…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 24, 2026, 7:02 p.m.

4.7

CVSS3.1

CVE-2026-35359 - uutils coreutils cp Information Disclosure via Time-of-Check to Time-of-Use Symlink Swap

A Time-of-Check to Time-of-Use (TOCTOU) vulnerability in the cp utility of uutils coreutils allows an attacker to bypass no-dereference intent. The utility checks if a source path is a symbolic link using path-based metadata but subsequently opens it without the O_NOFOLLOW flag. An attacker with co…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 24, 2026, 7:02 p.m.

4.4

CVSS3.1

CVE-2026-35358 - uutils coreutils cp Semantic Loss and Potential Denial of Service with -R via Device Node Stream Re…

The cp utility in uutils coreutils, when performing recursive copies (-R), incorrectly treats character and block device nodes as stream sources rather than preserving them. Because the implementation reads bytes into regular files at the destination instead of using mknod, device semantics are des…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 27, 2026, 7:54 p.m.

4.7

CVSS3.1

CVE-2026-35357 - uutils coreutils cp Information Disclosure via Permission Handling Race

The cp utility in uutils coreutils is vulnerable to an information disclosure race condition. Destination files are initially created with umask-derived permissions (e.g., 0644) before being restricted to their final mode (e.g., 0600) later in the process. A local attacker can race to open the file…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 24, 2026, 7:02 p.m.

6.3

CVSS3.1

CVE-2026-35356 - uutils coreutils install Arbitrary File Overwrite with -D via Path Component Symlink Race

A Time-of-Check to Time-of-Use (TOCTOU) vulnerability exists in the install utility of uutils coreutils when using the -D flag. The command creates parent directories and subsequently performs a second path resolution to create the target file, neither of which is anchored to a directory file descr…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 27, 2026, 12:27 p.m.
Total resulsts: 347742
Page 175 of 34,775
Β« previous page Β» next page
Filters