Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-35342— uutils coreutils mktemp Insecure Temporary File Placement via Empty TMPDIR

CVSS 3.3 · Low EPSS 0.01% · P3
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-35342

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
uutils coreutils mktemp Insecure Temporary File Placement via Empty TMPDIR
Source: NVD (National Vulnerability Database)
Vulnerability Description
The mktemp utility in uutils coreutils fails to properly handle an empty TMPDIR environment variable. Unlike GNU mktemp, which falls back to /tmp when TMPDIR is an empty string, the uutils implementation treats the empty string as a valid path. This causes temporary files to be created in the current working directory (CWD) instead of the intended secure temporary directory. If the CWD is more permissive or accessible to other users than /tmp, it may lead to unintended information disclosure or unauthorized access to temporary data.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
不安全的临时文件
Source: NVD (National Vulnerability Database)
Vulnerability Title
uutils coreutils 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
uutils coreutils是Uutils开源的一个跨平台核心命令行工具集。 uutils coreutils存在安全漏洞,该漏洞源于mktemp实用程序未能正确处理空的TMPDIR环境变量,与GNU mktemp在TMPDIR为空字符串时回退到/tmp不同,uutils实现将空字符串视为有效路径,导致临时文件在当前工作目录中创建,如果CWD比/tmp更宽松或可被其他用户访问,可能导致意外信息泄露或未经授权访问临时数据。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Uutilscoreutils 0 ~ 0.6.0 -

II. Public POCs for CVE-2026-35342

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-35342

登录查看更多情报信息。

Same Patch Batch · Uutils · 2026-04-22 · 44 CVEs total

CVE-2026-353387.3 HIGHuutils coreutils chmod Path Traversal Bypass of --preserve-root
CVE-2026-353687.2 HIGHuutils coreutils chroot Local Privilege Escalation and chroot Escape in via Name Service S
CVE-2026-353417.1 HIGHuutils coreutils mkfifo Unauthorized Permission Change on Existing Files
CVE-2026-353527.0 HIGHuutils coreutils mkfifo Privilege Escalation via TOCTOU Race Condition
CVE-2026-353496.7 MEDIUMuutils coreutils Path-Based Safety Bypass with --preserve-root
CVE-2026-353506.6 MEDIUMuutils coreutils cp Unexpected Privileged Executable Creation with -p
CVE-2026-353656.6 MEDIUMuutils coreutils mv Denial of Service and Data Duplication via Improper Symlink Expansion
CVE-2026-353606.3 MEDIUMuutils coreutils touch Arbitrary File Truncation via TOCTOU Race Condition
CVE-2026-353566.3 MEDIUMuutils coreutils install Arbitrary File Overwrite with -D via Path Component Symlink Race
CVE-2026-353746.3 MEDIUMuutils coreutils split Arbitrary File Truncation via Time-of-Check to Time-of-Use (TOCTOU)
CVE-2026-353556.3 MEDIUMuutils coreutils install Arbitrary File Overwrite via Symlink TOCTOU Race
CVE-2026-353646.3 MEDIUMuutils coreutils mv Arbitrary File Overwrite via Cross-Device TOCTOU Race Condition
CVE-2026-353635.6 MEDIUMuutils coreutils rm Safeguard Bypass via Improper Path Normalization
CVE-2026-353805.5 MEDIUMuutils coreutils cut Local Logic Error and Data Integrity Issue in Delimiter Parsing
CVE-2026-353695.5 MEDIUMuutils coreutils kill System-wide Process Termination and Denial of Service via Argument M
CVE-2026-353485.5 MEDIUMuutils coreutils sort Local Denial of Service via Forced UTF-8 Parsing
CVE-2026-353395.5 MEDIUMuutils coreutils chmod False Success Exit Code in Recursive Mode
CVE-2026-353405.5 MEDIUMuutils coreutils chown and chgrp False Success Exit Code in Recursive Mode
CVE-2026-353455.3 MEDIUMuutils coreutils tail Privileged Information Disclosure via Symlink Replacement Race
CVE-2026-353725.0 MEDIUMuutils coreutils ln Security Bypass via Improper Handling of the --no-dereference Flag

Showing top 20 of 44 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2026-35342

No comments yet


Leave a comment