CVE-2022-31104Incorrect Calculation in Cranelift-codegen

Severity
5.6MEDIUMNVD
EPSS
1.7%
top 17.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 28
Latest updateJun 29

Description

Wasmtime is a standalone runtime for WebAssembly. In affected versions wasmtime's implementation of the SIMD proposal for WebAssembly on x86_64 contained two distinct bugs in the instruction lowerings implemented in Cranelift. The aarch64 implementation of the simd proposal is not affected. The bugs were presented in the `i8x16.swizzle` and `select` WebAssembly instructions. The `select` instruction is only affected when the inputs are of `v128` type. The correspondingly affected Cranelift instr

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:LExploitability: 2.2 | Impact: 3.4

Affected Packages9 packages

Patches

🔴Vulnerability Details

3
OSV
Miscompilation of `i8x16.swizzle` and `select` with v128 inputs2022-06-29
GHSA
Miscompilation of `i8x16.swizzle` and `select` with v128 inputs2022-06-29
OSV
Miscompilation of `i8x16.swizzle` and `select` with v128 inputs2022-06-27

📋Vendor Advisories

2
Microsoft
Miscompilation of `i8x16.swizzle` and `select` with v128 inputs in Wasmtime2022-06-14
Debian
CVE-2022-31104: rust-wasmtime - Wasmtime is a standalone runtime for WebAssembly. In affected versions wasmtime'...2022