CVE-2026-35361

The mknod utility in uutils coreutils fails to handle security labels atomically by creating device nodes before setting the SELinux context. If labeling fails, the utility attempts cleanup using std::fs::remove_dir, which cannot remove device nodes or FIFOs. This leaves mislabeled nodes behind with incorrect default contexts, potentially allowing unauthorized access to device nodes that should have been restricted by mandatory access controls.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:uutils:coreutils:*:*:*:*:*:rust:*:*

History

27 Apr 2026, 12:27

Type Values Removed Values Added
CPE cpe:2.3:a:uutils:coreutils:*:*:*:*:*:rust:*:*
First Time Uutils
Uutils coreutils
References () https://github.com/uutils/coreutils/pull/10582 - () https://github.com/uutils/coreutils/pull/10582 - Exploit, Issue Tracking, Patch
References () https://github.com/uutils/coreutils/releases/tag/0.6.0 - () https://github.com/uutils/coreutils/releases/tag/0.6.0 - Release Notes

22 Apr 2026, 18:16

Type Values Removed Values Added
References () https://github.com/uutils/coreutils/pull/10582 - () https://github.com/uutils/coreutils/pull/10582 -

22 Apr 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-22 17:16

Updated : 2026-04-27 12:27


NVD link : CVE-2026-35361

Mitre link : CVE-2026-35361

CVE.ORG link : CVE-2026-35361


JSON object : View

Products Affected

uutils

  • coreutils
CWE
CWE-281

Improper Preservation of Permissions

CWE-459

Incomplete Cleanup