CVE-2024-28123

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-28123
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-28123.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-28123
Aliases
Published
2024-03-21T02:52:23Z
Modified
2024-05-14T13:10:28.614862Z
Summary
[none]
Details

Wasmi is an efficient and lightweight WebAssembly interpreter with a focus on constrained and embedded systems. In the WASMI Interpreter, an Out-of-bounds Buffer Write will arise if the host calls or resumes a Wasm function with more parameters than the default limit (128), as it will surpass the stack value. This doesn’t affect calls from Wasm to Wasm, only from host to Wasm. This vulnerability was patched in version 0.31.1.

References

Affected packages

Git / github.com/wasmi-labs/wasmi

Affected ranges

Type
GIT
Repo
https://github.com/wasmi-labs/wasmi
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.1.0
0.1.2
0.1.3
0.2.0
0.2.1
0.3
0.4.0
0.4.1
0.4.2
0.4.3
0.4.4
0.4.5
0.4.6
0.5
0.5.0
0.6.0
0.6.1
0.8.0

v0.*

v0.10.0
v0.11.0
v0.12.0
v0.13.0
v0.14.0
v0.15.0
v0.16.0
v0.17.0
v0.18.0
v0.18.1
v0.19.0
v0.20.0
v0.21.0
v0.22.0
v0.23.0
v0.24.0
v0.25.0
v0.26.0
v0.26.1
v0.27.0
v0.28.0
v0.28.0-wasi
v0.29.0
v0.30.0
v0.31.0
v0.7.0
v0.9.0
v0.9.1