CVE-2024-47763
- EPSS 0.01%
- Veröffentlicht 09.10.2024 18:15:08
- Zuletzt bearbeitet 29.09.2025 13:26:36
Wasmtime is an open source runtime for WebAssembly. Wasmtime's implementation of WebAssembly tail calls combined with stack traces can result in a runtime crash in certain WebAssembly modules. The runtime crash may be undefined behavior if Wasmtime w...
CVE-2024-30266
- EPSS 0.02%
- Veröffentlicht 04.04.2024 16:15:09
- Zuletzt bearbeitet 02.09.2025 14:46:00
wasmtime is a runtime for WebAssembly. The 19.0.0 release of Wasmtime contains a regression introduced during its development which can lead to a guest WebAssembly module causing a panic in the host runtime. A valid WebAssembly module, when executed ...
CVE-2023-41880
- EPSS 0.2%
- Veröffentlicht 15.09.2023 20:15:11
- Zuletzt bearbeitet 21.11.2024 08:21:50
Wasmtime is a standalone runtime for WebAssembly. Wasmtime versions from 10.0.0 to versions 10.02, 11.0.2, and 12.0.1 contain a miscompilation of the WebAssembly `i64x2.shr_s` instruction on x86_64 platforms when the shift amount is a constant value ...
CVE-2023-30624
- EPSS 0.14%
- Veröffentlicht 27.04.2023 17:15:08
- Zuletzt bearbeitet 21.11.2024 08:00:32
Wasmtime is a standalone runtime for WebAssembly. Prior to versions 6.0.2, 7.0.1, and 8.0.1, Wasmtime's implementation of managing per-instance state, such as tables and memories, contains LLVM-level undefined behavior. This undefined behavior was fo...
CVE-2023-27477
- EPSS 0.47%
- Veröffentlicht 08.03.2023 21:15:11
- Zuletzt bearbeitet 21.11.2024 07:52:58
wasmtime is a fast and secure runtime for WebAssembly. Wasmtime's code generation backend, Cranelift, has a bug on x86_64 platforms for the WebAssembly `i8x16.select` instruction which will produce the wrong results when the same operand is provided ...
CVE-2023-26489
- EPSS 2.65%
- Veröffentlicht 08.03.2023 20:15:09
- Zuletzt bearbeitet 21.11.2024 07:51:37
wasmtime is a fast and secure runtime for WebAssembly. In affected versions wasmtime's code generator, Cranelift, has a bug on x86_64 targets where address-mode computation mistakenly would calculate a 35-bit effective address instead of WebAssembly'...
CVE-2022-39394
- EPSS 0.11%
- Veröffentlicht 10.11.2022 20:15:11
- Zuletzt bearbeitet 21.11.2024 07:18:12
Wasmtime is a standalone runtime for WebAssembly. Prior to version 2.0.2, there is a bug in Wasmtime's C API implementation where the definition of the `wasmtime_trap_code` does not match its declared signature in the `wasmtime/trap.h` header file. T...
CVE-2022-39393
- EPSS 0.32%
- Veröffentlicht 10.11.2022 20:15:11
- Zuletzt bearbeitet 02.05.2025 13:15:45
Wasmtime is a standalone runtime for WebAssembly. Prior to versions 2.0.2 and 1.0.2, there is a bug in Wasmtime's implementation of its pooling instance allocator where when a linear memory is reused for another instance the initial heap snapshot of ...
CVE-2022-39392
- EPSS 0.19%
- Veröffentlicht 10.11.2022 20:15:11
- Zuletzt bearbeitet 21.11.2024 07:18:11
Wasmtime is a standalone runtime for WebAssembly. Prior to version 2.0.2, there is a bug in Wasmtime's implementation of its pooling instance allocator when the allocator is configured to give WebAssembly instances a maximum of zero pages of memory. ...
CVE-2022-31169
- EPSS 0.31%
- Veröffentlicht 22.07.2022 04:15:14
- Zuletzt bearbeitet 21.11.2024 07:04:02
Wasmtime is a standalone runtime for WebAssembly. There is a bug in Wasmtime's code generator, Cranelift, for AArch64 targets where constant divisors can result in incorrect division results at runtime. This affects Wasmtime prior to version 0.38.2 a...