Description
The "go bug" command writes to two files with predictable names in the system temporary directory (for example, "/tmp"). An attacker with access to the temporary directory can create a symlink in one of these names, causing "go bug" to overwrite the target of the symlink.
Published: 2026-05-07
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The `go bug` command in the Go toolchain creates two temporary files with predictable names in the system temporary directory. Based on the description, it is inferred that an attacker who can write to that directory may replace one of those filenames with a symbolic link, causing `go bug` to overwrite the link target. This local file overwrite could modify critical files used by privileged processes, potentially leading to privilege escalation or denial of service.

Affected Systems

This vulnerability exists in the Go toolchain, specifically the `cmd/go` command `go bug`. No specific Go version numbers are listed in the advisory, so all current releases that lack a fix are considered potentially affected. The issue can occur on any platform where the system temporary directory (e.g., /tmp on Unix-like systems) is writable by the user executing `go bug`. Based on the description, it is inferred that the vulnerability requires writable temporary directory access by the user.

Risk and Exploitability

The flaw is local, requiring write access to the system temporary directory, a permission that is usually granted to all users on many systems. Because the exploit does not involve any network interaction or remote execution, an EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that if the target file is critical, the impact could be severe, but the exploitation likelihood is moderate, relying on local access to the temporary directory.

Generated by OpenCVE AI on May 7, 2026 at 21:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Limit write permissions on the system temporary directory to trusted users only, preventing unprivileged users from creating symlinks or files there.
  • Regularly review and clean the temporary directory for unexpected symbolic links or files that could be used to overwrite sensitive data.
  • Upgrade the Go toolchain to a version that has fixed the temporary‑file symlink handling in `go bug` once an official patch becomes available.

Generated by OpenCVE AI on May 7, 2026 at 21:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 22:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22

Thu, 07 May 2026 20:00:00 +0000

Type Values Removed Values Added
Description The "go bug" command writes to two files with predictable names in the system temporary directory (for example, "/tmp"). An attacker with access to the temporary directory can create a symlink in one of these names, causing "go bug" to overwrite the target of the symlink.
Title Invoking "go bug" follows symlinks in predictable temporary filenames in cmd/go
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-05-07T19:41:18.849Z

Reserved: 2026-04-07T18:13:03.526Z

Link: CVE-2026-39819

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-07T20:16:43.083

Modified: 2026-05-07T20:38:04.860

Link: CVE-2026-39819

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T22:00:12Z

Weaknesses