RUSTSEC-2021-0067

Source
https://rustsec.org/advisories/RUSTSEC-2021-0067
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2021-0067.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2021-0067
Aliases
Published
2021-05-21T12:00:00Z
Modified
2023-11-08T04:05:55.118129Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Memory access due to code generation flaw in Cranelift module
Details

There is a bug in 0.73.0 of the Cranelift x64 backend that can create a scenario that could result in a potential sandbox escape in a WebAssembly module. Users of versions 0.73.0 of Cranelift should upgrade to either 0.73.1 or 0.74 to remediate this vulnerability. Users of Cranelift prior to 0.73.0 should update to 0.73.1 or 0.74 if they were not using the old default backend.

More details can be found in the GitHub Security Advisory at:

https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hpqh-2wqx-7qp5

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / cranelift-codegen

Package

Name
cranelift-codegen
View open source insights on deps.dev
Purl
pkg:cargo/cranelift-codegen

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0
Fixed
0.73.1

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "os": [],
        "functions": [],
        "arch": [
            "x86"
        ]
    }
}

Database specific

{
    "cvss": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
    "informational": null,
    "categories": [
        "code-execution",
        "memory-corruption",
        "memory-exposure"
    ]
}