CVE-2021-38297
golang: Command-line arguments may overwrite global data
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.
Go versiones anteriores a 1.16.9 y versiones 1.17.x anteriores a 1.17.2, presenta un Desbordamiento de Búfer por medio de argumentos grandes en una invocación de función desde un módulo WASM, cuando GOARCH=wasm GOOS=js es usado
A flaw was found in golang. This vulnerability can only be triggered when invoking functions from vulnerable WASM (WebAssembly) Modules. Go can be compiled to WASM. If the product or service doesn't use WASM functions, it is not affected, although it uses golang.
An update that solves one vulnerability and has one errata is now available. This update for go1.16 fixes the following issues. Update to go1.16.9 do not let command line args overwrite global data This update was imported from the SUSE:SLE-15:Update update project. Patch Instructions. To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-08-09 CVE Reserved
- 2021-10-18 CVE Published
- 2023-12-05 First Exploit
- 2024-08-04 CVE Updated
- 2025-07-09 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
https://groups.google.com/forum/#%21forum/golang-announce | ||
https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A | Mailing List | |
https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html | Mailing List |
|
https://security.netapp.com/advisory/ntap-20211118-0006 | Third Party Advisory |
|
URL | Date | SRC |
---|---|---|
https://github.com/gkrishnan724/CVE-2021-38297 | 2023-12-05 | |
https://github.com/paras98/CVE-2021-38297-Go-wasm-Replication | 2024-04-04 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | < 1.16.9 Search vendor "Golang" for product "Go" and version " < 1.16.9" | - |
Affected
| ||||||
Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | >= 1.17.0 < 1.17.2 Search vendor "Golang" for product "Go" and version " >= 1.17.0 < 1.17.2" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 34 Search vendor "Fedoraproject" for product "Fedora" and version "34" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 35 Search vendor "Fedoraproject" for product "Fedora" and version "35" | - |
Affected
|