TopVuln

High-risk vulnerability digests

CVE-2026-27143

  • CRITICAL

golang security update

Details

CVSS v3
9.8
NVD published
2026-04-08 02:16:03
EPSS
<0.1% probability · 5.4th percentile — 2026-05-12
Affected versions
All Go language versions prior to the 2026 official security update
Summary
This vulnerability occurs due to incorrect bounds checking of induction variables in Go compiler loops, which fails to catch arithmetic underflow or overflow. This flaw allows invalid memory indexing at runtime, potentially leading to memory corruption. Attackers can exploit this issue to compromise systems running applications compiled with the vulnerable Go compiler.
Remediation
Apply the latest official security update for the Go programming language from the Go project maintainers. Recompile all custom Go-based applications with the updated patched compiler. Verify all deployed Go binaries are built with the fixed version to eliminate exposure.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.