Vulnerability Details CVE-2021-39219
Wasmtime is an open source runtime for WebAssembly & WASI. Wasmtime before version 0.30.0 is affected by a type confusion vulnerability. As a Rust library the `wasmtime` crate clearly marks which functions are safe and which are `unsafe`, guaranteeing that if consumers never use `unsafe` then it should not be possible to have memory unsafety issues in their embeddings of Wasmtime. An issue was discovered in the safe API of `Linker::func_*` APIs. These APIs were previously not sound when one `Engine` was used to create the `Linker` and then a different `Engine` was used to create a `Store` and then the `Linker` was used to instantiate a module into that `Store`. Cross-`Engine` usage of functions is not supported in Wasmtime and this can result in type confusion of function pointers, resulting in being able to safely call a function with the wrong type. Triggering this bug requires using at least two `Engine` values in an embedding and then additionally using two different values with a `Linker` (one at the creation time of the `Linker` and another when instantiating a module with the `Linker`). It's expected that usage of more-than-one `Engine` in an embedding is relatively rare since an `Engine` is intended to be a globally shared resource, so the expectation is that the impact of this issue is relatively small. The fix implemented is to change this behavior to `panic!()` in Rust instead of silently allowing it. Using different `Engine` instances with a `Linker` is a programmer bug that `wasmtime` catches at runtime. This bug has been patched and users should upgrade to Wasmtime version 0.30.0. If you cannot upgrade Wasmtime and are using more than one `Engine` in your embedding it's recommended to instead use only one `Engine` for the entire program if possible. An `Engine` is designed to be a globally shared resource that is suitable to have only one for the lifetime of an entire process. If using multiple `Engine`s is required then code should be audited to ensure that `Linker` is only used with one `Engine`.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 23.2%
CVSS Severity
CVSS v3 Score 6.3
CVSS v2 Score 3.3
Products affected by CVE-2021-39219
-
cpe:2.3:a:bytecodealliance:wasmtime:0.10.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.11.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.12.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.15.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.16.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.17.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.18.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.19.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.2.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.20.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.21.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.22.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.22.1
-
cpe:2.3:a:bytecodealliance:wasmtime:0.23.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.24.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.25.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.26.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.26.1
-
cpe:2.3:a:bytecodealliance:wasmtime:0.27.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.28.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.29.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.3.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.4.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.6.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.8.0
-
cpe:2.3:a:bytecodealliance:wasmtime:0.9.0
-
cpe:2.3:o:fedoraproject:fedora:34
-
cpe:2.3:o:fedoraproject:fedora:35