Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Go Compiler Allows Memory Corruption in Certain Code

GO-2026-4867 CVE-2026-27144
Summary

The Go compiler can misinterpret certain code, leading to potential data corruption. This is a concern for developers who use the Go compiler to write code, as it can cause unexpected behavior or crashes. To stay safe, ensure you only use the latest version of the Go compiler and keep your code up to date.

What to do
  • Update toolchain to version 1.26.2.
Affected software
VendorProductAffected versionsFix available
– toolchain > 1.26.0-0 , <= 1.26.2 1.26.2
Original title
The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping mov...
Original description
The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime.
Published: 8 Apr 2026 · Updated: 9 Apr 2026 · First seen: 8 Apr 2026