CVE-2021-38297 log

Source
Severity Medium
Remote Yes
Type Arbitrary code execution
Description
A security issue has been found in go before version 1.17.2. When invoking functions from WASM modules, built using GOARCH=wasm GOOS=js, passing very large arguments can cause portions of the module to be overwritten with data from the arguments.

If using wasm_exec.js to execute WASM modules, users will need to replace their copy (as described in https://golang.org/wiki/WebAssembly#getting-started) after rebuilding any modules.
Group Package Affected Fixed Severity Status Ticket
AVG-2454 go 2:1.17.1-1 2:1.17.2-1 Medium Fixed
References
https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A
https://github.com/golang/go/issues/48797
https://github.com/golang/go/commit/4925e0766f8a92ab82913b3564228645613290f5