Symlink Vulnerability in Linux Affecting Various Applications
CVE-2026-32282

6.4MEDIUM

Key Information:

Vendor
CVE Published:
8 April 2026

What is CVE-2026-32282?

A vulnerability exists in the Root.Chmod operation on Linux systems, allowing for potential symlink traversal issues. If the target of a chmod operation is replaced with a symlink during the execution, the chmod can inadvertently operate on the symlink's target. This is due to the fchmodat system call bypassing the AT_SYMLINK_NOFOLLOW flag, which is intended to prevent unauthorized access to files outside the intended root directory. Although Root.Chmod verifies its target before execution and usually raises an error for unsafe symlinks, this race condition might allow unauthorized file modifications between the verification and operation stages.

Affected Version(s)

internal/syscall/unix linux 0 < 1.25.9

internal/syscall/unix linux 1.26.0-0 < 1.26.2

References

CVSS V3.1

Score:
6.4
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Uuganbayar Lkhamsuren (https://github.com/uug4na)
.