Nixpkgs security tracker

Login with GitHub

Suggestion detail

Untriaged
Permalink CVE-2026-35350
6.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
created 6 days, 11 hours ago Activity log
  • Created suggestion
uutils coreutils cp Unexpected Privileged Executable Creation with -p

The cp utility in uutils coreutils fails to properly handle setuid and setgid bits when ownership preservation fails. When copying with the -p (preserve) flag, the utility applies the source mode bits even if the chown operation is unsuccessful. This can result in a user-owned copy retaining original privileged bits, creating unexpected privileged executables that violate local security policies. This differs from GNU cp, which clears these bits when ownership cannot be preserved.

References

Affected products

coreutils

Matching in nixpkgs

pkgs.coreutils

GNU Core Utilities

  • nixos-unstable 9.10
    • nixpkgs-unstable 9.10
    • nixos-unstable-small 9.10
  • nixos-25.11 9.8
    • nixos-25.11-small 9.8
    • nixpkgs-25.11-darwin 9.8