This issue is not an escape from the WebAssembly sandbox. Execution of WebAssembly guest programs will still behave correctly with respect to memory sandboxing and isolation from the host. Wasmtime considers non-spec-compliant behavior as a security issue nonetheless.
This issue was discovered through fuzzing of Wasmtime's code generator Cranelift.
Wasmtime versions 10.0.2, 11.0.2, and 12.0.2 are all patched to no longer have this miscompilation. This issue only affects x86_64 hosts and the only workaround is to either scan for this pattern in wasm modules which is nontrivial or to disable the SIMD proposal for WebAssembly. Users prior to 10.0.0 are unaffected by this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2511 | Miscompilation of wasm `i64x2.shr_s` instruction with constant input on x86_64 |
Github GHSA |
GHSA-gw5p-q8mj-p7gh | Miscompilation of wasm `i64x2.shr_s` instruction with constant input on x86_64 |
Tue, 24 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-24T18:13:31.648Z
Reserved: 2023-09-04T16:31:48.223Z
Link: CVE-2023-41880
Updated: 2024-08-02T19:09:49.374Z
Status : Modified
Published: 2023-09-15T20:15:11.017
Modified: 2024-11-21T08:21:50.497
Link: CVE-2023-41880
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA