Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-g4v2-cjqp-rfmq: Critical Use-After-Free in Wasmi's Linear Memory

Summary

A use-after-free vulnerability has been discovered in the linear memory implementation of Wasmi. This issue can be triggered by a WebAssembly module under certain memory growth conditions, potentially leading to memory corruption, information disclosure, or code execution.

Impact

  • Confidentiality: High – attacker-controlled memory reads possible.
  • Integrity: High – memory corruption may allow arbitrary writes.
  • Availability: High – interpreter crashes possible.

Affected Versions

Wasmi v0.41.0 through Wasmi v1.0.0.

Workarounds

  • Upgrade to the latest patched version of Wasmi.
  • Consider limiting the maximum linear memory sizes where feasible.

Credits

This vulnerability was discovered by Robert T. Morris (RTM).

ghsa
#vulnerability#web

Summary

A use-after-free vulnerability has been discovered in the linear memory implementation of Wasmi. This issue can be triggered by a WebAssembly module under certain memory growth conditions, potentially leading to memory corruption, information disclosure, or code execution.

Impact

  • Confidentiality: High – attacker-controlled memory reads possible.
  • Integrity: High – memory corruption may allow arbitrary writes.
  • Availability: High – interpreter crashes possible.

Affected Versions

Wasmi v0.41.0 through Wasmi v1.0.0.

Workarounds

  • Upgrade to the latest patched version of Wasmi.
  • Consider limiting the maximum linear memory sizes where feasible.

Credits

This vulnerability was discovered by Robert T. Morris (RTM).

References

  • GHSA-g4v2-cjqp-rfmq
  • wasmi-labs/wasmi@0e6f0d2

ghsa: Latest News

GHSA-9rwj-6rc7-p77c: LangGraph's SQLite is vulnerable to SQL injection via metadata filter key in SQLite checkpointer list method