The "go bug" command writes to two files with predictable names in the system temporary directory (for example, "/tmp"). An attacker with access to the temporary directory can create a symlink in one of these names, causing "go bug" to overwrite the target of the symlink.
{
"cna_assigner": "Go",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/39xxx/CVE-2026-39819.json",
"unresolved_ranges": [
{
"extracted_events": [
{
"fixed": "1.25.10"
},
{
"introduced": "1.26.0-0"
},
{
"fixed": "1.26.3"
}
],
"source": "AFFECTED_FIELD"
}
]
}{
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "1.25.10"
},
{
"introduced": "1.26.0"
},
{
"fixed": "1.26.3"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*"
}