wasmtime_trap_code C API function has out of bounds write vulnerability
Low severity
GitHub Reviewed
Published
Nov 10, 2022
in
bytecodealliance/wasmtime
•
Updated May 2, 2025
Description
Published by the National Vulnerability Database
Nov 10, 2022
Published to the GitHub Advisory Database
Feb 1, 2024
Reviewed
Feb 1, 2024
Last updated
May 2, 2025
Impact
There is a bug in Wasmtime's C API implementation where the definition of the
wasmtime_trap_codedoes not match its declared signature in thewasmtime/trap.hheader file. This discrepancy causes the function implementation to perform a 4-byte write into a 1-byte buffer provided by the caller. This can lead to three zero bytes being written beyond the 1-byte location provided by the caller.Patches
This bug has been patched and users should upgrade to Wasmtime 2.0.2.
Workarounds
This can be worked around by providing a 4-byte buffer casted to a 1-byte buffer when calling
wasmtime_trap_code. Users of thewasmtimecrate are not affected by this issue, only users of the C API functionwasmtime_trap_codeare affected.References
wasmtime_trap_codemainbranchFor more information
If you have any questions or comments about this advisory:
References