CVE-2024-30266Type Confusion in Wasmtime

CWE-843Type Confusion6 documents4 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 94.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 4

Description

wasmtime is a runtime for WebAssembly. The 19.0.0 release of Wasmtime contains a regression introduced during its development which can lead to a guest WebAssembly module causing a panic in the host runtime. A valid WebAssembly module, when executed at runtime, may cause this panic. This vulnerability has been patched in version 19.0.1.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

debiandebian/rust-wasmtime< rust-wasmtime 21.0.2+dfsg-1 (forky)
crates.iobytecodealliance/wasmtime19.0.019.0.1
CVEListV5bytecodealliance/wasmtime= 19.0.0

Patches

🔴Vulnerability Details

4
OSV
CVE-2024-30266: wasmtime is a runtime for WebAssembly2024-04-04
OSV
Panic when using a dropped extenref-typed element segment2024-04-02
GHSA
Wasmtime vulnerable to panic when using a dropped extenref-typed element segment2024-04-02
OSV
Wasmtime vulnerable to panic when using a dropped extenref-typed element segment2024-04-02

📋Vendor Advisories

1
Debian
CVE-2024-30266: rust-wasmtime - wasmtime is a runtime for WebAssembly. The 19.0.0 release of Wasmtime contains a...2024