Wasmtime has Undefined Behavior in Rust runtime functions
CVE-2023-30624

3.9LOW

Key Information:

Status
Vendor
CVE Published:
27 April 2023

What is CVE-2023-30624?

Wasmtime, a standalone runtime for WebAssembly, has a critical implementation issue concerning the management of per-instance state like tables and memories. This vulnerability arises due to LLVM-level undefined behavior in versions before 6.0.2, 7.0.1, and 8.0.1. The problem is exacerbated when Wasmtime is compiled with the beta version of Rust (1.70) or later, resulting in critical writes being optimized away during runtime. The underlying cause lies within the Instance structure and a trailing VMContext, which require unsafe code for proper management. Recent updates in the structure to ensure safer pointer handling and the planned use of verification tools mark an important step towards mitigating the potential for exploitation. Users are advised to upgrade to the patched versions of Wasmtime to ensure stability and security during operation.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

wasmtime < 6.0.2 < 6.0.2

wasmtime = 7.0.0 = 7.0.0

wasmtime = 8.0.0 = 8.0.0

References

CVSS V3.1

Score:
3.9
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
High
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.