Vulnerability Description
The mknod utility in uutils coreutils fails to handle security labels atomically by creating device nodes before setting the SELinux context. If labeling fails, the utility attempts cleanup using std::fs::remove_dir, which cannot remove device nodes or FIFOs. This leaves mislabeled nodes behind with incorrect default contexts, potentially allowing unauthorized access to device nodes that should have been restricted by mandatory access controls.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Uutils | Coreutils | < 0.6.0 |
Related Weaknesses (CWE)
References
- https://github.com/uutils/coreutils/pull/10582ExploitIssue TrackingPatch
- https://github.com/uutils/coreutils/releases/tag/0.6.0Release Notes
- https://github.com/uutils/coreutils/pull/10582ExploitIssue TrackingPatch
FAQ
What is CVE-2026-35361?
CVE-2026-35361 is a vulnerability with a CVSS score of 3.4 (LOW). The mknod utility in uutils coreutils fails to handle security labels atomically by creating device nodes before setting the SELinux context. If labeling fails, the utility attempts cleanup using std:...
How severe is CVE-2026-35361?
CVE-2026-35361 has been rated LOW with a CVSS base score of 3.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-35361?
Check the references section above for vendor advisories and patch information. Affected products include: Uutils Coreutils.