CVE-2026-39817
Published: May 13, 2026Last modified: May 16, 2026
Description
The "go tool pack" subcommand (usually used only by the compiler as an internal tool with known-good inputs) does not sanitize output filenames. Extracting a malicious archive file with the "pack" subcommand can write files to arbitrary locations on the filesystem.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 5.9 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | LOW |
| User interaction | REQUIRED |
| Scope | CHANGED |
| Confidentiality | NONE |
| Integrity impact | HIGH |
| Availability impact | NONE |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | go | Fixed (1.25.10-r0) |
| 25 LTS | go | Fixed (1.25.10-r0) | |
| Stream | go | Fixed (1.26.3-r0) | |
| Hardened Containers | 23 LTS | go | Fixed (1.25.10-r0) |
| 25 LTS | go | Fixed (1.25.10-r0) | |
| Stream | go | Fixed (1.26.3-r0) |