Nixpkgs security tracker

Login with GitHub

Suggestion detail

Untriaged
Permalink CVE-2026-35341
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 6 days, 11 hours ago Activity log
  • Created suggestion
uutils coreutils mkfifo Unauthorized Permission Change on Existing Files

A vulnerability in uutils coreutils mkfifo allows for the unauthorized modification of permissions on existing files. When mkfifo fails to create a FIFO because a file already exists at the target path, it fails to terminate the operation for that path and continues to execute a follow-up set_permissions call. This results in the existing file's permissions being changed to the default mode (often 644 after umask), potentially exposing sensitive files such as SSH private keys to other users on the system.

References

Affected products

coreutils

Matching in nixpkgs

pkgs.coreutils

GNU Core Utilities

  • nixos-unstable 9.10
    • nixpkgs-unstable 9.10
    • nixos-unstable-small 9.10
  • nixos-25.11 9.8
    • nixos-25.11-small 9.8
    • nixpkgs-25.11-darwin 9.8