Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-38297

Опубликовано: 18 окт. 2021
Источник: debian
EPSS Низкий

Описание

Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-1.17fixed1.17.2-1package
golang-1.16fixed1.16.9-1package
golang-1.15fixed1.15.15-5package
golang-1.15fixed1.15.15-1~deb11u2bullseyepackage
golang-1.11removedpackage
golang-1.8not-affectedpackage
golang-1.7not-affectedpackage

Примечания

  • https://github.com/golang/go/commit/77f2750f4398990eed972186706f160631d7dae4

  • https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A

  • https://github.com/golang/go/issues/48797

EPSS

Процентиль: 90%
0.06318
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 3 лет назад

Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.

CVSS3: 9.8
redhat
больше 3 лет назад

Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.

CVSS3: 9.8
nvd
больше 3 лет назад

Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.

CVSS3: 9.8
msrc
больше 3 лет назад

Описание отсутствует

suse-cvrf
больше 3 лет назад

Security update for go1.17

EPSS

Процентиль: 90%
0.06318
Низкий