Source: rust-coreutils X-Debbugs-CC: [email protected] Severity: important Tags: security
Hi, The following vulnerability was published for rust-coreutils. CVE-2026-35367[0]: | The nohup utility in uutils coreutils creates its default output | file, nohup.out, without specifying explicit restricted permissions. | This causes the file to inherit umask-based permissions, typically | resulting in a world-readable file (0644). In multi-user | environments, this allows any user on the system to read the | captured stdout/stderr output of a command, potentially exposing | sensitive information. This behavior diverges from GNU coreutils, | which creates nohup.out with owner-only (0600) permissions. https://github.com/uutils/coreutils/issues/10021 If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-35367 https://www.cve.org/CVERecord?id=CVE-2026-35367 Please adjust the affected versions in the BTS as needed.

