CVE-2026-35367 PUBLISHED

uutils coreutils nohup Information Disclosure via Insecure Default Output Permissions

Assigner: canonical
Reserved: 02.04.2026 Published: 22.04.2026 Updated: 22.04.2026

The nohup utility in uutils coreutils creates its default output file, nohup.out, without specifying explicit restricted permissions. This causes the file to inherit umask-based permissions, typically resulting in a world-readable file (0644). In multi-user environments, this allows any user on the system to read the captured stdout/stderr output of a command, potentially exposing sensitive information. This behavior diverges from GNU coreutils, which creates nohup.out with owner-only (0600) permissions.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS Score: 3.3

Product Status

Vendor Uutils
Product coreutils
Versions Default: affected

Credits

  • Zellic finder

References

Problem Types

  • CWE-732: Incorrect Permission Assignment for Critical Resource CWE

Impacts

  • CAPEC-639: Probe System Files