vulnerability
FreeBSD: VID-4fce9635-28c0-11ec-9ba8-002324b2fba8 (CVE-2021-38297): go -- misc/wasm, cmd/link: do not let command line arguments overwrite global data
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Oct 9, 2021 | Nov 4, 2022 | Dec 10, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Oct 9, 2021
Added
Nov 4, 2022
Modified
Dec 10, 2025
Description
The Go project reports: When invoking functions from WASM modules, built using GOARCH=wasm GOOS=js, passing very large arguments can cause portions of the module to be overwritten with data from the arguments. If using wasm_exec.js to execute WASM modules, users will need to replace their copy after rebuilding any modules.
Solution
freebsd-upgrade-package-go
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.