vulnerability

FreeBSD: VID-4fce9635-28c0-11ec-9ba8-002324b2fba8 (CVE-2021-38297): go -- misc/wasm, cmd/link: do not let command line arguments overwrite global data

Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Oct 9, 2021
Added
Nov 4, 2022
Modified
Dec 10, 2025

Description

The Go project reports: When invoking functions from WASM modules, built using GOARCH=wasm GOOS=js, passing very large arguments can cause portions of the module to be overwritten with data from the arguments. If using wasm_exec.js to execute WASM modules, users will need to replace their copy after rebuilding any modules.

Solution

freebsd-upgrade-package-go
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.