CVE-2026-27140
Published: April 9, 2026Last modified: April 11, 2026
Description
SWIG file names containing 'cgo' and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 8.8 |
| Attack Vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | REQUIRED |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity impact | HIGH |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | go | Fixed (1.25.9-r0) |
| 25 LTS | go | Fixed (1.25.9-r0) | |
| Stream | go | Fixed (1.26.2-r0) | |
| Hardened Containers | 23 LTS | go | Fixed (1.25.9-r0) |
| 25 LTS | go | Fixed (1.25.9-r0) | |
| Stream | go | Fixed (1.26.2-r0) |