CVE-2021-38297 log

Severity Medium
Remote Yes
Type Arbitrary code execution
A security issue has been found in go before version 1.17.2. When invoking functions from WASM modules, built using GOARCH=wasm GOOS=js, passing very large arguments can cause portions of the module to be overwritten with data from the arguments.

If using wasm_exec.js to execute WASM modules, users will need to replace their copy (as described in after rebuilding any modules.
Group Package Affected Fixed Severity Status Ticket
AVG-2454 go 2:1.17.1-1 2:1.17.2-1 Medium Fixed