DEBIAN-CVE-2026-35342

Source
https://security-tracker.debian.org/tracker/CVE-2026-35342
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35342.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-35342
Upstream
  • CVE-2026-35342
Published
2026-04-23T00:03:10.843407Z
Modified
2026-04-23T04:07:37.487843Z
Summary
[none]
Details

The mktemp utility in uutils coreutils fails to properly handle an empty TMPDIR environment variable. Unlike GNU mktemp, which falls back to /tmp when TMPDIR is an empty string, the uutils implementation treats the empty string as a valid path. This causes temporary files to be created in the current working directory (CWD) instead of the intended secure temporary directory. If the CWD is more permissive or accessible to other users than /tmp, it may lead to unintended information disclosure or unauthorized access to temporary data.

References

Affected packages

Debian:12 / rust-coreutils

Package

Name
rust-coreutils
Purl
pkg:deb/debian/rust-coreutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.0.17-2
0.0.17-3
0.0.17-4
0.0.17-5
0.0.17-6
0.0.19-1
0.0.19-2
0.0.19-3
0.0.20-1
0.0.21-1
0.0.22-1
0.0.23-1
0.0.23-2
0.0.23-3
0.0.24-1
0.0.24-2
0.0.26-1
0.0.26-2
0.0.26-3
0.0.26-4
0.0.26-5
0.0.27-1
0.0.27-2
0.0.27-3
0.0.30-1
0.0.30-2
0.0.30-3~exp1
0.0.30-3
0.0.30-4
0.6.0-1
0.7.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35342.json"

Debian:13 / rust-coreutils

Package

Name
rust-coreutils
Purl
pkg:deb/debian/rust-coreutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.0.30-2
0.0.30-3~exp1
0.0.30-3
0.0.30-4
0.6.0-1
0.7.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35342.json"

Debian:14 / rust-coreutils

Package

Name
rust-coreutils
Purl
pkg:deb/debian/rust-coreutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.0.30-2
0.0.30-3~exp1
0.0.30-3
0.0.30-4
0.6.0-1
0.7.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35342.json"