CVE-2025-64345Race Condition in Wasmtime

CWE-362Race Condition7 documents5 sources
Severity
1.8LOWNVD
EPSS
0.0%
top 99.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 12

Description

Wasmtime is a runtime for WebAssembly. Prior to version 38.0.4, 37.0.3, 36.0.3, and 24.0.5, Wasmtime's Rust embedder API contains an unsound interaction where a WebAssembly shared linear memory could be viewed as a type which provides safe access to the host (Rust) to the contents of the linear memory. This is not sound for shared linear memories, which could be modified in parallel, and this could lead to a data race in the host. Patch releases have been issued for all supported versions of Was

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:NExploitability: 0.3 | Impact: 1.4

Affected Packages3 packages

debiandebian/rust-wasmtime< rust-wasmtime 27.0.0+dfsg-2 (forky)
CVEListV5bytecodealliance/wasmtime< 24.0.5+3
crates.iobytecodealliance/wasmtime38.0.038.0.4+5

🔴Vulnerability Details

4
OSV
Wasmtime provides unsound API access to a WebAssembly shared linear memory2025-11-12
GHSA
Wasmtime provides unsound API access to a WebAssembly shared linear memory2025-11-12
OSV
CVE-2025-64345: Wasmtime is a runtime for WebAssembly2025-11-12
OSV
Unsound API access to a WebAssembly shared linear memory2025-11-11

📋Vendor Advisories

2
Red Hat
wasmtime: Wasmtime unsound API access to shared linear memory2025-11-12
Debian
CVE-2025-64345: rust-wasmtime - Wasmtime is a runtime for WebAssembly. Prior to version 38.0.4, 37.0.3, 36.0.3, ...2025