Learn about CVE-2021-39219 impacting Wasmtime, an open-source WebAssembly runtime. Find out the vulnerability details, impact, affected versions, and mitigation steps.
Wasmtime before version 0.30.0, an open-source runtime for WebAssembly & WASI, is affected by a type confusion vulnerability. This CVE has a base score of 6.3 (Medium severity).
Understanding CVE-2021-39219
Wasmtime is impacted by a type confusion vulnerability leading to the wrong type for
Linker
-defined functions when used across two Engine
s.
What is CVE-2021-39219?
The vulnerability in Wasmtime allows for type confusion when using different
Engine
instances with a Linker
, enabling the safe calling of a function with the wrong type.
The Impact of CVE-2021-39219
This vulnerability has a CVSS base score of 6.3, with high integrity impact and availability impact. It requires local access and no privileges, with user interaction needed for exploitation.
Technical Details of CVE-2021-39219
Wasmtime's vulnerability arises due to the unsafe usage of
Linker
with multiple Engine
instances.
Vulnerability Description
Engine
is used to create the Linker
, and a different Engine
is used to create a Store
, leading to type confusion of function pointers.Affected Systems and Versions
Exploitation Mechanism
Engine
values in an embedding, with two different values with a Linker
.Engine
is used with Linker
.Mitigation and Prevention
Ways to mitigate and prevent the CVE-2021-39219 vulnerability:
Immediate Steps to Take
Engine
is used with Linker
.Long-Term Security Practices
Linker
misuse across different Engine
instances.Patching and Updates