Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-39392

Опубликовано: 10 нояб. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 5.9

Описание

Wasmtime is a standalone runtime for WebAssembly. Prior to version 2.0.2, there is a bug in Wasmtime's implementation of its pooling instance allocator when the allocator is configured to give WebAssembly instances a maximum of zero pages of memory. In this configuration, the virtual memory mapping for WebAssembly memories did not meet the compiler-required configuration requirements for safely executing WebAssembly modules. Wasmtime's default settings require virtual memory page faults to indicate that wasm reads/writes are out-of-bounds, but the pooling allocator's configuration would not create an appropriate virtual memory mapping for this meaning out of bounds reads/writes can successfully read/write memory unrelated to the wasm sandbox within range of the base address of the memory mapping created by the pooling allocator. This bug is not applicable with the default settings of the wasmtime crate. This bug can only be triggered by setting InstanceLimits::memory_pages to ze...

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

code not present
esm-infra/focal

DNE

focal

ignored

end of standard support, was ignored [bundled deps handled by upstream in new versions]
jammy

not-affected

code not present
kinetic

not-affected

code not present
lunar

not-affected

code not present
mantic

not-affected

code not present
noble

not-affected

code not present
trusty

ignored

end of standard support

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
esm-apps/bionic

ignored

esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

trusty

DNE

upstream

ignored

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
esm-apps/focal

ignored

esm-infra/bionic

ignored

focal

ignored

jammy

DNE

kinetic

DNE

trusty

DNE

upstream

ignored

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

esm-infra/focal

ignored

focal

ignored

jammy

DNE

kinetic

DNE

trusty

DNE

upstream

ignored

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-apps/jammy

ignored

esm-infra/focal

DNE

focal

DNE

jammy

ignored

kinetic

ignored

end of life, was needs-triage
lunar

ignored

end of life, was needs-triage
mantic

DNE

noble

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

esm-infra/focal

DNE

focal

DNE

jammy

ignored

kinetic

DNE

trusty

DNE

upstream

ignored

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

ignored

bundled deps handled by upstream in new versions
esm-infra/focal

DNE

focal

ignored

end of standard support, was ignored [bundled deps handled by upstream in new versions]
jammy

ignored

bundled deps handled by upstream in new versions
kinetic

ignored

end of life, was needed
lunar

ignored

end of life, was ignored [bundled deps handled by upstream in new versions]
mantic

ignored

end of life, was ignored [bundled deps handled by upstream in new versions]
noble

ignored

bundled deps handled by upstream in new versions
trusty

ignored

end of standard support

Показывать по

EPSS

Процентиль: 41%
0.00194
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
nvd
около 3 лет назад

Wasmtime is a standalone runtime for WebAssembly. Prior to version 2.0.2, there is a bug in Wasmtime's implementation of its pooling instance allocator when the allocator is configured to give WebAssembly instances a maximum of zero pages of memory. In this configuration, the virtual memory mapping for WebAssembly memories did not meet the compiler-required configuration requirements for safely executing WebAssembly modules. Wasmtime's default settings require virtual memory page faults to indicate that wasm reads/writes are out-of-bounds, but the pooling allocator's configuration would not create an appropriate virtual memory mapping for this meaning out of bounds reads/writes can successfully read/write memory unrelated to the wasm sandbox within range of the base address of the memory mapping created by the pooling allocator. This bug is not applicable with the default settings of the `wasmtime` crate. This bug can only be triggered by setting `InstanceLimits::memory_pages` to zero.

CVSS3: 5.9
debian
около 3 лет назад

Wasmtime is a standalone runtime for WebAssembly. Prior to version 2.0 ...

CVSS3: 5.9
github
около 3 лет назад

Wasmtime out of bounds read/write with zero-memory-pages configuration

EPSS

Процентиль: 41%
0.00194
Низкий

5.9 Medium

CVSS3