Описание
An out-of-bound memory read vulnerability was discovered in Bytecode Alliance wasm-micro-runtime v2.0.0 which allows a remote attacker to cause a denial of service via the "block_type_get_arity" function in core/iwasm/interpreter/wasm.h.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | code not present |
| esm-apps/bionic | not-affected | code not present |
| esm-apps/focal | not-affected | code not present |
| esm-apps/jammy | not-affected | code not present |
| esm-apps/noble | not-affected | code not present |
| focal | not-affected | code not present |
| jammy | not-affected | code not present |
| mantic | ignored | end of life, was needs-triage |
| noble | not-affected | code not present |
| oracular | released | 1.44.3-2ubuntu0.1 |
Показывать по
7.5 High
CVSS3
Связанные уязвимости
An out-of-bound memory read vulnerability was discovered in Bytecode Alliance wasm-micro-runtime v2.0.0 which allows a remote attacker to cause a denial of service via the "block_type_get_arity" function in core/iwasm/interpreter/wasm.h.
An out-of-bound memory read vulnerability was discovered in Bytecode Alliance wasm-micro-runtime v2.0.0 which allows a remote attacker to cause a denial of service via the "block_type_get_arity" function in core/iwasm/interpreter/wasm.h.
Уязвимость функции block_type_get_arity файла core/iwasm/interpreter/wasm.h среды выполнения для WebAssembly-приложений WebAssembly Micro Runtime (WAMR), позволяющая нарушителю вызвать отказ в обслуживании
7.5 High
CVSS3