The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime.
| Vendor | Product | Versions |
|---|---|---|
| go toolchain | cmd/compile | 0, 1.26.0-0, 1.25.8, 1.26.1 |
Updated severity to CRITICAL, added affected versions 1.25.8 and 1.26.1, and marked the vulnerability as actively exploited.
Initial creation