wasmtime_trap_code C API function has out of bounds write vulnerability
Low severity
GitHub Reviewed
Published
Nov 10, 2022
in
bytecodealliance/wasmtime
•
Updated Feb 1, 2024
Description
Published by the National Vulnerability Database
Nov 10, 2022
Published to the GitHub Advisory Database
Feb 1, 2024
Reviewed
Feb 1, 2024
Last updated
Feb 1, 2024
Impact
There is a bug in Wasmtime's C API implementation where the definition of the
wasmtime_trap_code
does not match its declared signature in thewasmtime/trap.h
header file. This discrepancy causes the function implementation to perform a 4-byte write into a 1-byte buffer provided by the caller. This can lead to three zero bytes being written beyond the 1-byte location provided by the caller.Patches
This bug has been patched and users should upgrade to Wasmtime 2.0.2.
Workarounds
This can be worked around by providing a 4-byte buffer casted to a 1-byte buffer when calling
wasmtime_trap_code
. Users of thewasmtime
crate are not affected by this issue, only users of the C API functionwasmtime_trap_code
are affected.References
wasmtime_trap_code
main
branchFor more information
If you have any questions or comments about this advisory:
References