Home

Description

The nohup utility in uutils coreutils creates its default output file, nohup.out, without specifying explicit restricted permissions. This causes the file to inherit umask-based permissions, typically resulting in a world-readable file (0644). In multi-user environments, this allows any user on the system to read the captured stdout/stderr output of a command, potentially exposing sensitive information. This behavior diverges from GNU coreutils, which creates nohup.out with owner-only (0600) permissions.

PUBLISHED Reserved 2026-04-02 | Published 2026-04-22 | Updated 2026-04-22 | Assigner canonical




LOW: 3.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-732: Incorrect Permission Assignment for Critical Resource

Product status

Default status
affected

Credits

Zellic finder

References

github.com/uutils/coreutils/issues/10021 exploit

github.com/uutils/coreutils/issues/10021 issue-tracking

cve.org (CVE-2026-35367)

nvd.nist.gov (CVE-2026-35367)

Download JSON