A vulnerability in uutils coreutils mkfifo allows for the unauthorized modification of permissions on existing files. When mkfifo fails to create a FIFO because a file already exists at the target path, it fails to terminate the operation for that path and continues to execute a follow-up set_permissions call. This results in the existing file's permissions being changed to the default mode (often 644 after umask), potentially exposing sensitive files such as SSH private keys to other users on the system.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/uutils/coreutils/issues/10020 |
|
History
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in uutils coreutils mkfifo allows for the unauthorized modification of permissions on existing files. When mkfifo fails to create a FIFO because a file already exists at the target path, it fails to terminate the operation for that path and continues to execute a follow-up set_permissions call. This results in the existing file's permissions being changed to the default mode (often 644 after umask), potentially exposing sensitive files such as SSH private keys to other users on the system. | |
| Title | uutils coreutils mkfifo Unauthorized Permission Change on Existing Files | |
| Weaknesses | CWE-732 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-22T16:07:39.221Z
Reserved: 2026-04-02T12:58:56.087Z
Link: CVE-2026-35341
No data.
Status : Received
Published: 2026-04-22T17:16:36.060
Modified: 2026-04-22T17:16:36.060
Link: CVE-2026-35341
No data.
OpenCVE Enrichment
No data.