A vulnerability categorized as critical has been discovered in syscall-unix up to 1.25.8/1.26.1 on Go. Executing a manipulation of the argument AT_SYMLINK_NOFOLLOW can lead to symlink following. The attack is restricted to local execution.
| Vendor | Product | Versions |
|---|---|---|
| go standard library | internal/syscall/unix | 0, 1.26.0-0, 1.25.8, 1.26.1 |
Updated severity to CRITICAL, added affected versions 1.25.8 and 1.26.1, and provided a new description with critical details about the vulnerability.
Initial creation