uutils coreutils CVE-2026-35352

| EUVD-2026-24986 HIGH
Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367)
2026-04-22 canonical
7.0
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Re-analysis Queued
Apr 24, 2026 - 19:07 vuln.today
cvss_changed
Analysis Generated
Apr 23, 2026 - 06:52 vuln.today

DescriptionNVD

A Time-of-Check to Time-of-Use (TOCTOU) race condition exists in the mkfifo utility of uutils coreutils. The utility creates a FIFO and then performs a path-based chmod to set permissions. A local attacker with write access to the parent directory can swap the newly created FIFO for a symbolic link between these two operations. This redirects the chmod call to an arbitrary file, potentially enabling privilege escalation if the utility is run with elevated privileges.

AnalysisAI

Privilege escalation in uutils coreutils mkfifo utility allows local attackers with low privileges to manipulate file permissions on arbitrary system files. A TOCTOU race condition between FIFO creation and permission setting enables symlink swapping attacks, redirecting chmod operations to unintended targets. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Inventory all systems using uutils coreutils and identify mkfifo usage in automated scripts, cron jobs, and privileged processes. Within 7 days: Implement directory write restrictions on locations where mkfifo executes and audit all automated processes using this utility for necessity and privilege levels. …

Sign in for detailed remediation steps.

Share

CVE-2026-35352 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy