Source: rust-wasmtime
Version: 26.0.1+dfsg-10
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 26.0.1+dfsg-4
Control: found -1 26.0.1+dfsg-3

Hi,

The following vulnerability was published for rust-wasmtime.

CVE-2025-64345[0]:
| Wasmtime is a runtime for WebAssembly. Prior to version 38.0.4,
| 37.0.3, 36.0.3, and 24.0.5, Wasmtime's Rust embedder API contains an
| unsound interaction where a WebAssembly shared linear memory could
| be viewed as a type which provides safe access to the host (Rust) to
| the contents of the linear memory. This is not sound for shared
| linear memories, which could be modified in parallel, and this could
| lead to a data race in the host. Patch releases have been issued for
| all supported versions of Wasmtime, notably: 24.0.5, 36.0.3, 37.0.3,
| and 38.0.4. These releases reject creation of shared memories via
| `Memory::new` and shared memories are now excluded from core dumps.
| As a workaround, eembeddings affected by this issue should use
| `SharedMemory::new` instead of `Memory::new` to create shared
| memories. Affected embeddings should also disable core dumps if they
| are unable to upgrade. Note that core dumps are disabled by default
| but the wasm threads proposal (and shared memory) is enabled by
| default.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-64345
    https://www.cve.org/CVERecord?id=CVE-2025-64345
[1] 
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hc7m-r6v8-hg9q
[2] 
https://github.com/bytecodealliance/wasmtime/commit/9ebb6934f00d58b92fb68ed0e0b16c0ae828ca10

Regards,
Salvatore

Reply via email to