Low severity3.3NVD Advisory· Published Apr 22, 2026· Updated Apr 24, 2026
CVE-2026-35367
CVE-2026-35367
Description
The nohup utility in uutils coreutils creates its default output file, nohup.out, without specifying explicit restricted permissions. This causes the file to inherit umask-based permissions, typically resulting in a world-readable file (0644). In multi-user environments, this allows any user on the system to read the captured stdout/stderr output of a command, potentially exposing sensitive information. This behavior diverges from GNU coreutils, which creates nohup.out with owner-only (0600) permissions.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
coreutilscrates.io | <= 0.8.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/uutils/coreutils/issues/10021nvdExploitIssue TrackingVendor AdvisoryWEB
- github.com/advisories/GHSA-5hgf-628x-mcqfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-35367ghsaADVISORY
News mentions
0No linked articles in our index yet.