Back

Critical Memory Corruption Vulnerabilities in SUSE Go Versions

Severity: High (Score: 70.5)

Sources: Linuxsecurity

Summary

SUSE has released advisories for critical vulnerabilities in Go versions 1.25 and 1.26, identified as CVE-2026-27140, CVE-2026-27143, CVE-2026-27144, CVE-2026-32280, CVE-2026-32281, CVE-2026-32282, and CVE-2026-32283. These vulnerabilities include a trust layer bypass, potential memory corruption, and issues with chain building in cryptographic functions. The vulnerabilities affect systems using these Go versions, with CVE-2026-27143 and CVE-2026-27140 rated as high severity. The vulnerabilities were published on April 8, 2026, and patches have been made available. Users are urged to update to the latest versions to mitigate risks. The advisories indicate that exploitation could lead to unauthorized access and system instability. Organizations using affected Go versions should prioritize applying the updates to safeguard their systems. Key Points: • Critical vulnerabilities identified in SUSE Go versions 1.25 and 1.26. • Patches are available for CVEs published on April 8, 2026. • Exploitation could lead to unauthorized access and system instability.

Key Entities

  • CVE-2026-27140 (cve)
  • CVE-2026-27143 (cve)
  • CVE-2026-27144 (cve)
  • CVE-2026-32280 (cve)
  • CVE-2026-32281 (cve)
  • Linux (platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed