DEBIAN-CVE-2026-35352

Source
https://security-tracker.debian.org/tracker/CVE-2026-35352
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35352.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-35352
Upstream
  • CVE-2026-35352
Published
2026-04-22T17:16:37.597Z
Modified
2026-04-28T20:32:51.417370Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A Time-of-Check to Time-of-Use (TOCTOU) race condition exists in the mkfifo utility of uutils coreutils. The utility creates a FIFO and then performs a path-based chmod to set permissions. A local attacker with write access to the parent directory can swap the newly created FIFO for a symbolic link between these two operations. This redirects the chmod call to an arbitrary file, potentially enabling privilege escalation if the utility is run with elevated privileges.

References

Affected packages

Debian:12 / rust-coreutils

Package

Name
rust-coreutils
Purl
pkg:deb/debian/rust-coreutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.0.17-2
0.0.17-3
0.0.17-4
0.0.17-5
0.0.17-6
0.0.19-1
0.0.19-2
0.0.19-3
0.0.20-1
0.0.21-1
0.0.22-1
0.0.23-1
0.0.23-2
0.0.23-3
0.0.24-1
0.0.24-2
0.0.26-1
0.0.26-2
0.0.26-3
0.0.26-4
0.0.26-5
0.0.27-1
0.0.27-2
0.0.27-3
0.0.30-1
0.0.30-2
0.0.30-3~exp1
0.0.30-3
0.0.30-4
0.6.0-1
0.7.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35352.json"

Debian:13 / rust-coreutils

Package

Name
rust-coreutils
Purl
pkg:deb/debian/rust-coreutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.0.30-2
0.0.30-3~exp1
0.0.30-3
0.0.30-4
0.6.0-1
0.7.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35352.json"

Debian:14 / rust-coreutils

Package

Name
rust-coreutils
Purl
pkg:deb/debian/rust-coreutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.0.30-2
0.0.30-3~exp1
0.0.30-3
0.0.30-4
0.6.0-1
0.7.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35352.json"