Source: rust-coreutils
X-Debbugs-CC: [email protected]
Severity: important
Tags: security

Hi,

The following vulnerability was published for rust-coreutils.

CVE-2026-35367[0]:
| The nohup utility in uutils coreutils creates its default output
| file, nohup.out, without specifying explicit restricted permissions.
| This causes the file to inherit umask-based permissions, typically
| resulting in a world-readable file (0644). In multi-user
| environments, this allows any user on the system to read the
| captured stdout/stderr output of a command, potentially exposing
| sensitive information. This behavior diverges from GNU coreutils,
| which creates nohup.out with owner-only (0600) permissions.

https://github.com/uutils/coreutils/issues/10021


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-35367
    https://www.cve.org/CVERecord?id=CVE-2026-35367

Please adjust the affected versions in the BTS as needed.

Reply via email to