CVE-2024-47813 — Time-of-check Time-of-use (TOCTOU) Race Condition in Wasmtime
Severity
2.9LOWNVD
EPSS
0.0%
top 97.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 9
Description
Wasmtime is an open source runtime for WebAssembly. Under certain concurrent event orderings, a `wasmtime::Engine`'s internal type registry was susceptible to double-unregistration bugs due to a race condition, leading to panics and potentially type registry corruption. That registry corruption could, following an additional and particular sequence of concurrent events, lead to violations of WebAssembly's control-flow integrity (CFI) and type safety. Users that do not use `wasmtime::Engine` acro…
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:LExploitability: 0.3 | Impact: 2.5
Affected Packages4 packages
🔴Vulnerability Details
4OSV▶
Wasmtime race condition could lead to WebAssembly control-flow integrity and type safety violations↗2024-10-09
GHSA▶
Wasmtime race condition could lead to WebAssembly control-flow integrity and type safety violations↗2024-10-09
OSV▶
Race condition could lead to WebAssembly control-flow integrity and type safety violations↗2024-10-03
📋Vendor Advisories
1Debian▶
CVE-2024-47813: rust-wasmtime - Wasmtime is an open source runtime for WebAssembly. Under certain concurrent eve...↗2024