Bug 2012887 (CVE-2021-38297) - CVE-2021-38297 golang: Command-line arguments may overwrite global data
Summary: CVE-2021-38297 golang: Command-line arguments may overwrite global data
Keywords:
Status: NEW
Alias: CVE-2021-38297
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2014920 2014921 2014923 2015107 2015108 2015109 2015198 2015199 2014922
Blocks: 2012888
TreeView+ depends on / blocked
 
Reported: 2021-10-11 14:23 UTC by Pedro Sampaio
Modified: 2021-11-09 22:53 UTC (History)
114 users (show)

Fixed In Version: go 1.17.2, go 1.16.9
Doc Type: If docs needed, set a value
Doc Text:
A validation flaw was found in golang. When invoking functions from WASM modules built using GOARCH=wasm GOOS=js, passing very large arguments can cause portions of the module to be overwritten with data from the arguments. The highest threat from this vulnerability is to integrity.
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description Pedro Sampaio 2021-10-11 14:23:01 UTC
When invoking functions from WASM modules, built using GOARCH=wasm GOOS=js, passing very large arguments can cause portions of the module to be overwritten with data from the arguments.

If using wasm_exec.js to execute WASM modules, users will need to replace their copy (as described in https://golang.org/wiki/WebAssembly#getting-started) after rebuilding any modules.

References:

https://github.com/golang/go/issues/48797
https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A

Comment 3 Summer Long 2021-10-14 01:59:28 UTC

Comment 6 Summer Long 2021-10-18 00:27:12 UTC
Created golang tracking bugs for this issue:

Affects: epel-all [bug 2014920]
Affects: fedora-all [bug 2014923]
Affects: openstack-rdo [bug 2014921]


Note You need to log in before you can comment on or make changes to this bug.