DEBIAN-CVE-2026-35354

Source
https://security-tracker.debian.org/tracker/CVE-2026-35354
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35354.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-35354
Upstream
  • CVE-2026-35354
Published
2026-04-22T17:16:37.867Z
Modified
2026-05-05T17:02:50.317980Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

A Time-of-Check to Time-of-Use (TOCTOU) vulnerability exists in the mv utility of uutils coreutils during cross-device moves. The extended attribute (xattr) preservation logic uses multiple path-based system calls that perform fresh path-to-inode lookups for each operation. A local attacker with write access to the directory can exploit this race to swap files between calls, causing the destination file to receive an inconsistent mix of security xattrs, such as SELinux labels or file capabilities.

References

Affected packages

Debian:12 / rust-coreutils

Package

Name
rust-coreutils
Purl
pkg:deb/debian/rust-coreutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.0.17-2
0.0.17-3
0.0.17-4
0.0.17-5
0.0.17-6
0.0.19-1
0.0.19-2
0.0.19-3
0.0.20-1
0.0.21-1
0.0.22-1
0.0.23-1
0.0.23-2
0.0.23-3
0.0.24-1
0.0.24-2
0.0.26-1
0.0.26-2
0.0.26-3
0.0.26-4
0.0.26-5
0.0.27-1
0.0.27-2
0.0.27-3
0.0.30-1
0.0.30-2
0.0.30-3~exp1
0.0.30-3
0.0.30-4
0.6.0-1
0.7.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35354.json"

Debian:13 / rust-coreutils

Package

Name
rust-coreutils
Purl
pkg:deb/debian/rust-coreutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.0.30-2
0.0.30-3~exp1
0.0.30-3
0.0.30-4
0.6.0-1
0.7.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35354.json"