CVE-2021-39219Type Confusion in Wasmtime

CWE-843Type Confusion10 documents4 sources
Severity
6.3MEDIUMNVD
EPSS
0.1%
top 77.69%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 17
Latest updateSep 20

Description

Wasmtime is an open source runtime for WebAssembly & WASI. Wasmtime before version 0.30.0 is affected by a type confusion vulnerability. As a Rust library the `wasmtime` crate clearly marks which functions are safe and which are `unsafe`, guaranteeing that if consumers never use `unsafe` then it should not be possible to have memory unsafety issues in their embeddings of Wasmtime. An issue was discovered in the safe API of `Linker::func_*` APIs. These APIs were previously not sound when one `Eng

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:HExploitability: 1.0 | Impact: 5.2

Affected Packages5 packages

PyPIbytecodealliance/wasmtime0.26.00.30.0+4
crates.iobytecodealliance/wasmtime0.0.0-00.30.0+2
CVEListV5bytecodealliance/wasmtime0.29.0

Also affects: Fedora 34, 35

Patches

🔴Vulnerability Details

8
GHSA
Wrong type for `Linker`-define functions when used across two `Engine`s2021-09-20
OSV
Out-of-bounds read/write and invalid free with `externref`s and GC safepoints in Wasmtime2021-09-20
OSV
Use after free passing `externref`s to Wasm in Wasmtime2021-09-20
OSV
Wrong type for `Linker`-define functions when used across two `Engine`s2021-09-20
OSV
Multiple Vulnerabilities in Wasmtime2021-09-17

📋Vendor Advisories

1
Debian
CVE-2021-39219: rust-wasmtime - Wasmtime is an open source runtime for WebAssembly & WASI. Wasmtime before versi...2021