๐Ÿ” CVE Alert

CVE-2026-27144

HIGH 7.1

Miscompilation allows memory corruption via CONVNOP-wrapped array copy in cmd/compile

CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
1th

The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime.

Vendor go toolchain
Product cmd/compile
Published Apr 8, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for go toolchain cmd/compile

Be the first to know when new high vulnerabilities affecting go toolchain cmd/compile are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Go toolchain / cmd/compile
0 < 1.25.9 1.26.0-0 < 1.26.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
go.dev: https://go.dev/cl/763764 go.dev: https://go.dev/issue/78371 groups.google.com: https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU pkg.go.dev: https://pkg.go.dev/vuln/GO-2026-4867

Credits

Jakub Ciolek - https://ciolek.dev/