CVE-2026-32282

Published: April 9, 2026Last modified: April 11, 2026

Description

On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.

Severity score breakdown

ParameterValue
Base score6.4
Attack VectorLOCAL
Attack complexityHIGH
Privileges requiredHIGH
User interactionNONE
ScopeUNCHANGED
ConfidentialityHIGH
Integrity impactHIGH
Availability impactHIGH
VectorCVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSgoFixed (1.25.9-r0)
25 LTSgoFixed (1.25.9-r0)
StreamgoFixed (1.26.2-r0)
Hardened Containers23 LTSgoFixed (1.25.9-r0)
25 LTSgoFixed (1.25.9-r0)
StreamgoFixed (1.26.2-r0)

References

ON THIS PAGE