The mknod utility in uutils coreutils fails to handle security labels atomically by creating device nodes before setting the SELinux context. If labeling fails, the utility attempts cleanup using std::fs::remove_dir, which cannot remove device nodes or FIFOs. This leaves mislabeled nodes behind with incorrect default contexts, potentially allowing unauthorized access to device nodes that should have been restricted by mandatory access controls.
References
| Link | Resource |
|---|---|
| https://github.com/uutils/coreutils/pull/10582 | Exploit Issue Tracking Patch |
| https://github.com/uutils/coreutils/releases/tag/0.6.0 | Release Notes |
| https://github.com/uutils/coreutils/pull/10582 | Exploit Issue Tracking Patch |
Configurations
History
27 Apr 2026, 12:27
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:uutils:coreutils:*:*:*:*:*:rust:*:* | |
| First Time |
Uutils
Uutils coreutils |
|
| References | () https://github.com/uutils/coreutils/pull/10582 - Exploit, Issue Tracking, Patch | |
| References | () https://github.com/uutils/coreutils/releases/tag/0.6.0 - Release Notes |
22 Apr 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/uutils/coreutils/pull/10582 - |
22 Apr 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-22 17:16
Updated : 2026-04-27 12:27
NVD link : CVE-2026-35361
Mitre link : CVE-2026-35361
CVE.ORG link : CVE-2026-35361
JSON object : View
Products Affected
uutils
- coreutils
