Related Vulnerabilities: CVE-2021-38297  

A security issue has been found in go before version 1.17.2. When invoking functions from WASM modules, built using GOARCH=wasm GOOS=js, passing very large arguments can cause portions of the module to be overwritten with data from the arguments. If using wasm_exec.js to execute WASM modules, users will need to replace their copy (as described in https://golang.org/wiki/WebAssembly#getting-started) after rebuilding any modules.

Severity Medium

Remote Yes

Type Arbitrary code execution

Description

A security issue has been found in go before version 1.17.2. When invoking functions from WASM modules, built using GOARCH=wasm GOOS=js, passing very large arguments can cause portions of the module to be overwritten with data from the arguments.

If using wasm_exec.js to execute WASM modules, users will need to replace their copy (as described in https://golang.org/wiki/WebAssembly#getting-started) after rebuilding any modules.

AVG-2454 go 2:1.17.1-1 Medium Vulnerable

https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A
https://github.com/golang/go/issues/48797
https://github.com/golang/go/commit/4925e0766f8a92ab82913b3564228645613290f5