Lucene search

K

21 matches found

CVE
CVE
added 2023/03/08 8:15 p.m.318 views

CVE-2023-26489

wasmtime is a fast and secure runtime for WebAssembly. In affected versions wasmtime's code generator, Cranelift, has a bug on x86_64 targets where address-mode computation mistakenly would calculate a 35-bit effective address instead of WebAssembly's defined 33-bit effective address. This bug mean...

9.9CVSS9.6AI score0.01169EPSS
CVE
CVE
added 2023/03/08 9:15 p.m.315 views

CVE-2023-27477

wasmtime is a fast and secure runtime for WebAssembly. Wasmtime's code generation backend, Cranelift, has a bug on x86_64 platforms for the WebAssembly i8x16.select instruction which will produce the wrong results when the same operand is provided to the instruction and some of the selected indices...

4.3CVSS4.5AI score0.00176EPSS
CVE
CVE
added 2024/10/09 6:15 p.m.228 views

CVE-2024-47813

Wasmtime is an open source runtime for WebAssembly. Under certain concurrent event orderings, a wasmtime::Engine's internal type registry was susceptible to double-unregistration bugs due to a race condition, leading to panics and potentially type registry corruption. That registry corruption could...

2.9CVSS3.6AI score0.00007EPSS
CVE
CVE
added 2024/04/04 4:15 p.m.217 views

CVE-2024-30266

wasmtime is a runtime for WebAssembly. The 19.0.0 release of Wasmtime contains a regression introduced during its development which can lead to a guest WebAssembly module causing a panic in the host runtime. A valid WebAssembly module, when executed at runtime, may cause this panic. This vulnerabil...

3.3CVSS3.6AI score0.00017EPSS
CVE
CVE
added 2024/11/05 10:15 p.m.196 views

CVE-2024-51745

Wasmtime is a fast and secure runtime for WebAssembly. Wasmtime's filesystem sandbox implementation on Windows blocks access to special device filenames such as "COM1", "COM2", "LPT0", "LPT1", and so on, however it did not block access to the special device filenames which use superscript digits, s...

2.3CVSS6.7AI score0.00078EPSS
CVE
CVE
added 2024/10/09 6:15 p.m.195 views

CVE-2024-47763

Wasmtime is an open source runtime for WebAssembly. Wasmtime's implementation of WebAssembly tail calls combined with stack traces can result in a runtime crash in certain WebAssembly modules. The runtime crash may be undefined behavior if Wasmtime was compiled with Rust 1.80 or prior. The runtime ...

5.5CVSS5.4AI score0.00007EPSS
CVE
CVE
added 2022/02/16 10:15 p.m.75 views

CVE-2022-23636

Wasmtime is an open source runtime for WebAssembly & WASI. Prior to versions 0.34.1 and 0.33.1, there exists a bug in the pooling instance allocator in Wasmtime's runtime where a failure to instantiate an instance for a module that defines an externref global will result in an invalid drop of a VME...

8.1CVSS6.5AI score0.00174EPSS
CVE
CVE
added 2022/06/28 12:15 a.m.70 views

CVE-2022-31104

Wasmtime is a standalone runtime for WebAssembly. In affected versions wasmtime's implementation of the SIMD proposal for WebAssembly on x86_64 contained two distinct bugs in the instruction lowerings implemented in Cranelift. The aarch64 implementation of the simd proposal is not affected. The bug...

6.8CVSS5.6AI score0.00641EPSS
CVE
CVE
added 2021/09/17 8:15 p.m.69 views

CVE-2021-39219

Wasmtime is an open source runtime for WebAssembly & WASI. Wasmtime before version 0.30.0 is affected by a type confusion vulnerability. As a Rust library the wasmtime crate clearly marks which functions are safe and which are unsafe, guaranteeing that if consumers never use unsafe then it should n...

6.3CVSS6.3AI score0.00074EPSS
CVE
CVE
added 2022/03/31 11:15 p.m.67 views

CVE-2022-24791

Wasmtime is a standalone JIT-style runtime for WebAssembly, using Cranelift. There is a use after free vulnerability in Wasmtime when both running Wasm that uses externrefs and enabling epoch interruption in Wasmtime. If you are not explicitly enabling epoch interruption (it is disabled by default)...

9.8CVSS9.1AI score0.00373EPSS
CVE
CVE
added 2021/09/17 9:15 p.m.64 views

CVE-2021-39218

Wasmtime is an open source runtime for WebAssembly & WASI. In Wasmtime from version 0.26.0 and before version 0.30.0 is affected by a memory unsoundness vulnerability. There was an invalid free and out-of-bounds read and write bug when running Wasm that uses externrefs in Wasmtime. To trigger this ...

6.3CVSS6.5AI score0.00089EPSS
CVE
CVE
added 2022/07/21 4:15 a.m.64 views

CVE-2022-31146

Wasmtime is a standalone runtime for WebAssembly. There is a bug in the Wasmtime's code generator, Cranelift, where functions using reference types may be incorrectly missing metadata required for runtime garbage collection. This means that if a GC happens at runtime then the GC pass will mistakenl...

8.8CVSS7.5AI score0.00141EPSS
CVE
CVE
added 2021/05/24 4:15 p.m.62 views

CVE-2021-32629

Cranelift is an open-source code generator maintained by Bytecode Alliance. It translates a target-independent intermediate representation into executable machine code. There is a bug in 0.73 of the Cranelift x64 backend that can create a scenario that could result in a potential sandbox escape in ...

8.8CVSS7.8AI score0.00139EPSS
CVE
CVE
added 2022/07/22 4:15 a.m.61 views

CVE-2022-31169

Wasmtime is a standalone runtime for WebAssembly. There is a bug in Wasmtime's code generator, Cranelift, for AArch64 targets where constant divisors can result in incorrect division results at runtime. This affects Wasmtime prior to version 0.38.2 and Cranelift prior to 0.85.2. This issue only aff...

7.5CVSS6.8AI score0.00137EPSS
CVE
CVE
added 2021/09/17 8:15 p.m.58 views

CVE-2021-39216

Wasmtime is an open source runtime for WebAssembly & WASI. In Wasmtime from version 0.19.0 and before version 0.30.0 there was a use-after-free bug when passing externrefs from the host to guest Wasm content. To trigger the bug, you have to explicitly pass multiple externrefs from the host to a Was...

6.3CVSS6.4AI score0.00074EPSS
CVE
CVE
added 2022/11/10 8:15 p.m.55 views

CVE-2022-39393

Wasmtime is a standalone runtime for WebAssembly. Prior to versions 2.0.2 and 1.0.2, there is a bug in Wasmtime's implementation of its pooling instance allocator where when a linear memory is reused for another instance the initial heap snapshot of the prior instance can be visible, erroneously to...

8.6CVSS8.4AI score0.00095EPSS
CVE
CVE
added 2022/11/10 8:15 p.m.53 views

CVE-2022-39392

Wasmtime is a standalone runtime for WebAssembly. Prior to version 2.0.2, there is a bug in Wasmtime's implementation of its pooling instance allocator when the allocator is configured to give WebAssembly instances a maximum of zero pages of memory. In this configuration, the virtual memory mapping...

7.4CVSS6.4AI score0.00078EPSS
CVE
CVE
added 2022/11/10 8:15 p.m.50 views

CVE-2022-39394

Wasmtime is a standalone runtime for WebAssembly. Prior to version 2.0.2, there is a bug in Wasmtime's C API implementation where the definition of the wasmtime_trap_code does not match its declared signature in the wasmtime/trap.h header file. This discrepancy causes the function implementation to...

9.8CVSS6.8AI score0.00041EPSS
CVE
CVE
added 2023/09/15 8:15 p.m.44 views

CVE-2023-41880

Wasmtime is a standalone runtime for WebAssembly. Wasmtime versions from 10.0.0 to versions 10.02, 11.0.2, and 12.0.1 contain a miscompilation of the WebAssembly i64x2.shr_s instruction on x86_64 platforms when the shift amount is a constant value that is larger than 32. Only x86_64 is affected so ...

5.3CVSS4.7AI score0.00169EPSS
CVE
CVE
added 2023/04/27 5:15 p.m.41 views

CVE-2023-30624

Wasmtime is a standalone runtime for WebAssembly. Prior to versions 6.0.2, 7.0.1, and 8.0.1, Wasmtime's implementation of managing per-instance state, such as tables and memories, contains LLVM-level undefined behavior. This undefined behavior was found to cause runtime-level issues when compiled w...

8.8CVSS6.7AI score0.00088EPSS
CVE
CVE
added 5 days ago3 views

CVE-2025-53901

Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.4, 33.0.2, and 34.0.2, a bug in Wasmtime's implementation of the WASIp1 set of import functions can lead to a WebAssembly guest inducing a panic in the host (embedder). The specific bug is triggered by calling path_open after calling fd_...

3.5CVSS6.7AI score0.00045EPSS