CVE-2021-38297 log
Source |
|
Severity | Medium |
Remote | Yes |
Type | Arbitrary code execution |
Description | A security issue has been found in go before version 1.17.2. When invoking functions from WASM modules, built using GOARCH=wasm GOOS=js, passing very large arguments can cause portions of the module to be overwritten with data from the arguments. If using wasm_exec.js to execute WASM modules, users will need to replace their copy (as described in https://golang.org/wiki/WebAssembly#getting-started) after rebuilding any modules. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-2454 | go | 2:1.17.1-1 | 2:1.17.2-1 | Medium | Fixed |
References |
---|
https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A https://github.com/golang/go/issues/48797 https://github.com/golang/go/commit/4925e0766f8a92ab82913b3564228645613290f5 |