Source: rust-coreutils X-Debbugs-CC: [email protected] Severity: important Tags: security
Hi, The following vulnerability was published for rust-coreutils. CVE-2026-35374[0]: | A Time-of-Check to Time-of-Use (TOCTOU) vulnerability exists in the | split utility of uutils coreutils. The program attempts to prevent | data loss by checking for identity between input and output files | using their file paths before initiating the split operation. | However, the utility subsequently opens the output file with | truncation after this path-based validation is complete. A local | attacker with write access to the directory can exploit this race | window by manipulating mutable path components (e.g., swapping a | path with a symbolic link). This can cause split to truncate and | write to an unintended target file, potentially including the input | file itself or other sensitive files accessible to the process, | leading to permanent data loss. https://github.com/uutils/coreutils/pull/11401 If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-35374 https://www.cve.org/CVERecord?id=CVE-2026-35374 Please adjust the affected versions in the BTS as needed.

