First published: Thu Oct 07 2021(Updated: )
A flaw was found in golang. This vulnerability can only be triggered when invoking functions from vulnerable WASM (WebAssembly) Modules. Go can be compiled to WASM. If the product or service doesn't use WASM functions, it is not affected, although it uses golang.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:0.26.0-2.el8 | 0:0.26.0-2.el8 |
Golang Go | <1.16.9 | |
Golang Go | >=1.17.0<1.17.2 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
IBM Cloud Pak for Security | <=1.10.0.0 - 1.10.11.0 | |
IBM QRadar Suite Software | <=1.10.12.0 - 1.10.16.0 |
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-38297 is a vulnerability in Go before version 1.16.9 and 1.17.x before version 1.17.2 that allows a buffer overflow via large arguments in a function.
This vulnerability affects golang when invoking functions from vulnerable WASM (WebAssembly) modules. If the product or service does not use WASM functions, it is not affected.
CVE-2021-38297 has a severity rating of critical with a value of 9.
The remedy for CVE-2021-38297 is to update to version 1.16.9 or 1.17.2 of golang.
You can find more information about CVE-2021-38297 in the provided references: [CVE.org](https://www.cve.org/CVERecord?id=CVE-2021-38297), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2021-38297), [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=2012887), [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2022:0434).