← Back to CVEs
CVE-2026-35361
LOW3.4
Description
The mknod utility in uutils coreutils fails to handle security labels atomically by creating device nodes before setting the SELinux context. If labeling fails, the utility attempts cleanup using std::fs::remove_dir, which cannot remove device nodes or FIFOs. This leaves mislabeled nodes behind with incorrect default contexts, potentially allowing unauthorized access to device nodes that should have been restricted by mandatory access controls.
CVE Details
CVSS v3.1 Score3.4
SeverityLOW
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published4/22/2026
Last Modified4/22/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-281CWE-459
References
https://github.com/uutils/coreutils/pull/10582(security@ubuntu.com)
https://github.com/uutils/coreutils/releases/tag/0.6.0(security@ubuntu.com)
https://github.com/uutils/coreutils/pull/10582(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.