Learn about CVE-2021-39218 affecting Wasmtime versions 0.26.0 to 0.29.0. Discover the impact, technical details, and mitigation steps for this critical vulnerability.
Wasmtime, an open-source WebAssembly & WASI runtime, from version 0.26.0 to 0.29.0, is vulnerable to memory unsoundness.
Understanding CVE-2021-39218
This CVE details a critical vulnerability affecting Wasmtime versions 0.26.0 to 0.29.0.
What is CVE-2021-39218?
The vulnerability involves an invalid free and out-of-bounds read/write bug occurring when running Wasm utilizing
externref
s in Wasmtime, potentially leading to memory corruption.
The Impact of CVE-2021-39218
The vulnerability carries a CVSS base score of 6.3, with high severity in integrity and availability but none in confidentiality. It requires low privileges and local access to exploit.
Technical Details of CVE-2021-39218
The technical aspects of the vulnerability are as follows:
Vulnerability Description
externref
s during garbage collection, leading to memory unsoundness.Affected Systems and Versions
Exploitation Mechanism
externref
s, host creation of non-null externrefs
, and specific GC safepoint conditions.Mitigation and Prevention
Steps to address and prevent the vulnerability:
Immediate Steps to Take
Long-Term Security Practices
false
to wasmtime::Config::wasm_reference_types
function.Patching and Updates