Learn about CVE-2021-39219 impacting Wasmtime, an open-source WebAssembly runtime. Find out the vulnerability details, impact, affected versions, and mitigation steps.
Wasmtime before version 0.30.0, an open-source runtime for WebAssembly & WASI, is affected by a type confusion vulnerability. This CVE has a base score of 6.3 (Medium severity).
Understanding CVE-2021-39219
Wasmtime is impacted by a type confusion vulnerability leading to the wrong type for
Linker-defined functions when used across two Engines.
What is CVE-2021-39219?
The vulnerability in Wasmtime allows for type confusion when using different
Engine instances with a Linker, enabling the safe calling of a function with the wrong type.
The Impact of CVE-2021-39219
This vulnerability has a CVSS base score of 6.3, with high integrity impact and availability impact. It requires local access and no privileges, with user interaction needed for exploitation.
Technical Details of CVE-2021-39219
Wasmtime's vulnerability arises due to the unsafe usage of
Linker with multiple Engine instances.
Vulnerability Description
Engine is used to create the Linker, and a different Engine is used to create a Store, leading to type confusion of function pointers.Affected Systems and Versions
Exploitation Mechanism
Engine values in an embedding, with two different values with a Linker.Engine is used with Linker.Mitigation and Prevention
Ways to mitigate and prevent the CVE-2021-39219 vulnerability:
Immediate Steps to Take
Engine is used with Linker.Long-Term Security Practices
Linker misuse across different Engine instances.Patching and Updates