Описание
Wasmi is a WebAssembly interpreter focused on constrained and embedded systems. In versions 0.41.0, 0.41.1, 0.42.0 through 0.47.1, 0.50.0 through 0.51.2 and 1.0.0, Wasmi's linear memory implementation leads to a Use After Free vulnerability, triggered by a WebAssembly module under certain memory growth conditions. This issue potentially leads to memory corruption, information disclosure, or code execution. This issue is fixed in versions 0.41.2, 0.47.1, 0.51.3 and 1.0.1. To workaround this issue, consider limiting the maximum linear memory sizes where feasible.
Ссылки
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 0.41.0 (включая) до 0.41.2 (исключая)Версия от 0.47.0 (включая) до 0.47.1 (исключая)Версия от 0.51.0 (включая) до 0.51.3 (исключая)
Одно из
cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:*
cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:*
cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:*
cpe:2.3:a:wasmi-labs:wasmi:1.0.0:*:*:*:*:rust:*:*
EPSS
Процентиль: 4%
0.00017
Низкий
8.4 High
CVSS3
7.8 High
CVSS3
Дефекты
CWE-416
Связанные уязвимости
EPSS
Процентиль: 4%
0.00017
Низкий
8.4 High
CVSS3
7.8 High
CVSS3
Дефекты
CWE-416