{"id":"CVE-2026-27144","summary":"Miscompilation allows memory corruption via CONVNOP-wrapped array copy in cmd/compile","details":"The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime.","aliases":["BIT-golang-2026-27144","GO-2026-4867"],"modified":"2026-05-15T04:14:30.919738801Z","published":"2026-04-08T01:06:56.908Z","related":["CGA-c99r-9grh-783c","SUSE-SU-2026:1320-1","SUSE-SU-2026:1321-1","SUSE-SU-2026:1580-1","SUSE-SU-2026:1581-1","SUSE-SU-2026:21355-1","SUSE-SU-2026:21356-1","openSUSE-SU-2026:10514-1","openSUSE-SU-2026:10525-1","openSUSE-SU-2026:10673-1","openSUSE-SU-2026:20570-1","openSUSE-SU-2026:20571-1","openSUSE-SU-2026:20703-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"fixed":"1.25.9"},{"introduced":"1.26.0-0"},{"fixed":"1.26.2"}],"source":"AFFECTED_FIELD"}],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27144.json","cna_assigner":"Go"},"references":[{"type":"WEB","url":"https://go.dev/cl/763764"},{"type":"WEB","url":"https://go.dev/issue/78371"},{"type":"WEB","url":"https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"},{"type":"WEB","url":"https://pkg.go.dev"},{"type":"WEB","url":"https://pkg.go.dev/vuln/GO-2026-4867"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27144.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27144"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"}]}