Unrated severityNVD Advisory· Published Oct 18, 2021· Updated Aug 4, 2024
CVE-2021-38297
CVE-2021-38297
Description
Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.
Affected products
34- Go/Godescription
- osv-coords33 versionspkg:bitnami/golangpkg:rpm/almalinux/delvepkg:rpm/almalinux/golangpkg:rpm/almalinux/golang-binpkg:rpm/almalinux/golang-docspkg:rpm/almalinux/golang-miscpkg:rpm/almalinux/golang-racepkg:rpm/almalinux/golang-srcpkg:rpm/almalinux/golang-testspkg:rpm/almalinux/go-toolsetpkg:rpm/opensuse/go1.16&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/go1.16&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/go1.16&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/go1.17&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/go1.17&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/google-guest-agent&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/google-guest-agent&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/google-osconfig-agent&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/google-osconfig-agent&distro=openSUSE%20Tumbleweedpkg:rpm/suse/go1.16&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/go1.16&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP3pkg:rpm/suse/go1.17&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/go1.17&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP3pkg:rpm/suse/google-guest-agent&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012pkg:rpm/suse/google-guest-agent&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP1pkg:rpm/suse/google-guest-agent&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP2pkg:rpm/suse/google-guest-agent&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP3pkg:rpm/suse/google-guest-agent&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP4pkg:rpm/suse/google-osconfig-agent&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012pkg:rpm/suse/google-osconfig-agent&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP1pkg:rpm/suse/google-osconfig-agent&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP2pkg:rpm/suse/google-osconfig-agent&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP3pkg:rpm/suse/google-osconfig-agent&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP4
< 1.16.9+ 32 more
- (no CPE)range: < 1.16.9
- (no CPE)range: < 1.7.2-1.module_el8.6.0+2736+ec10aba8
- (no CPE)range: < 1.17.7-1.module_el8.6.0+2736+ec10aba8
- (no CPE)range: < 1.17.7-1.module_el8.6.0+2736+ec10aba8
- (no CPE)range: < 1.17.7-1.module_el8.6.0+2736+ec10aba8
- (no CPE)range: < 1.17.7-1.module_el8.6.0+2736+ec10aba8
- (no CPE)range: < 1.17.7-1.module_el8.6.0+2736+ec10aba8
- (no CPE)range: < 1.17.7-1.module_el8.6.0+2736+ec10aba8
- (no CPE)range: < 1.17.7-1.module_el8.6.0+2736+ec10aba8
- (no CPE)range: < 1.17.7-1.module_el8.6.0+2736+ec10aba8
- (no CPE)range: < 1.16.9-lp152.14.1
- (no CPE)range: < 1.16.9-1.29.1
- (no CPE)range: < 1.16.9-1.1
- (no CPE)range: < 1.17.2-1.6.2
- (no CPE)range: < 1.17.2-1.1
- (no CPE)range: < 20230221.00-150000.1.34.1
- (no CPE)range: < 20230221.00-2.1
- (no CPE)range: < 20230222.00-150000.1.27.1
- (no CPE)range: < 20230222.00-2.1
- (no CPE)range: < 1.16.9-1.29.1
- (no CPE)range: < 1.16.9-1.29.1
- (no CPE)range: < 1.17.2-1.6.2
- (no CPE)range: < 1.17.2-1.6.2
- (no CPE)range: < 20230221.00-1.29.1
- (no CPE)range: < 20230221.00-150000.1.34.1
- (no CPE)range: < 20230221.00-150000.1.34.1
- (no CPE)range: < 20230221.00-150000.1.34.1
- (no CPE)range: < 20230221.00-150000.1.34.1
- (no CPE)range: < 20230222.00-1.20.1
- (no CPE)range: < 20230222.00-150000.1.27.1
- (no CPE)range: < 20230222.00-150000.1.27.1
- (no CPE)range: < 20230222.00-150000.1.27.1
- (no CPE)range: < 20230222.00-150000.1.27.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OFS3M3OFB24SWPTIAPARKGPUMQVUY6Z/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ON7BQRRJZBOR5TJHURBAB3WLF4YXFC6Z/mitrevendor-advisory
- security.gentoo.org/glsa/202208-02mitrevendor-advisory
- lists.debian.org/debian-lts-announce/2023/04/msg00021.htmlmitremailing-list
- groups.google.com/forum/mitre
- groups.google.com/g/golang-announce/c/AEBu9j7yj5Amitre
- security.netapp.com/advisory/ntap-20211118-0006/mitre
News mentions
0No linked articles in our index yet.