Code Generation Bug in Wasmtime Affects WebAssembly on x86_64 Platforms
CVE-2023-27477
What is CVE-2023-27477?
Wasmtime, a fast and secure runtime for WebAssembly, contains a code generation bug affecting x86_64 platforms. Specifically, the bug occurs in the handling of the i8x16.select instruction when the same operand is used for the selection, and some selected indices exceed 16. This error arises from an off-by-one calculation in the mask for the pshufb instruction, leading to incorrect results, especially when lanes are selected from a secondary vector. Users are encouraged to update to Wasmtime versions 6.0.1, 5.0.1, or 4.0.1 to avoid this issue. For those unable to upgrade immediately, it is advisable to disable the Wasm SIMD proposal as a temporary measure. Notably, this bug does not affect other architectures such as AArch64 and s390x.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
wasmtime cranelift-codegen: >= 0.88.0, < 0.91.1 < cranelift-codegen: 0.88.0, 0.91.1
wasmtime cranelift-codegen: >= 0.92.0, < 0.92.1 < cranelift-codegen: 0.92.0, 0.92.1
wasmtime cranelift-codegen: >= 0.93.0, < 0.93.1 < cranelift-codegen: 0.93.0, 0.93.1
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
