Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-27139

Опубликовано: 06 мар. 2026
Источник: redhat
CVSS3: 2.5

Описание

On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.

A path traversal flaw has been discovered in the golang os module. On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2openshift-golang-builder-containerFix deferred
OpenShift Service Mesh 3openshift-golang-builder-containerFix deferred
Red Hat Enterprise Linux 10golangFix deferred
Red Hat Enterprise Linux 8go-toolset:rhel8/golangFix deferred
Red Hat Enterprise Linux 9golangFix deferred
Red Hat Enterprise Linux AI (RHEL AI) 3golangFix deferred
Red Hat Hardened Imagesgolang1.25Affected
Red Hat Hardened Imagesgolang1.26Affected
Red Hat OpenShift Container Platform 4openshift-golang-builder-containerFix deferred
Red Hat OpenShift Virtualization 4openshift-golang-builder-containerFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2445335os: FileInfo can escape from a Root in golang os module

2.5 Low

CVSS3

Связанные уязвимости

CVSS3: 2.5
ubuntu
20 дней назад

On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.

CVSS3: 2.5
nvd
20 дней назад

On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.

msrc
16 дней назад

FileInfo can escape from a Root in os

CVSS3: 2.5
debian
20 дней назад

On Unix platforms, when listing the contents of a directory using File ...

CVSS3: 2.5
github
20 дней назад

On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.

2.5 Low

CVSS3