CVE-2021-38297 log
| Source |
|
| Severity | Medium |
| Remote | Yes |
| Type | Arbitrary code execution |
| Description | A security issue has been found in go before version 1.17.2. When invoking functions from WASM modules, built using GOARCH=wasm GOOS=js, passing very large arguments can cause portions of the module to be overwritten with data from the arguments. If using wasm_exec.js to execute WASM modules, users will need to replace their copy (as described in https://golang.org/wiki/WebAssembly#getting-started) after rebuilding any modules. |
| Group | Package | Affected | Fixed | Severity | Status | Ticket |
|---|---|---|---|---|---|---|
| AVG-2454 | go | 2:1.17.1-1 | 2:1.17.2-1 | Medium | Fixed |
| References |
|---|
https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A https://github.com/golang/go/issues/48797 https://github.com/golang/go/commit/4925e0766f8a92ab82913b3564228645613290f5 |