SB2021052128 - Access of Memory Location After End of Buffer in cranelift-codegen



SB2021052128 - Access of Memory Location After End of Buffer in cranelift-codegen

Published: May 21, 2021 Updated: April 23, 2026

Security Bulletin ID SB2021052128
CSH Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 vulnerability.


1) Access of Memory Location After End of Buffer (CVE-ID: CVE-2021-32629)

The vulnerability allows a remote attacker to access memory outside the intended WebAssembly sandbox.

The vulnerability exists due to improper code generation in the Cranelift x64 backend when reloading spilled integer values narrower than 64 bits during WebAssembly heap address computation. A remote attacker can execute a specially crafted WebAssembly module to access memory outside the intended WebAssembly sandbox.

The issue occurs when a spilled i32 value is sign-extended instead of zero-extended under specific register-allocation and instruction-selection conditions, and can allow access to memory up to 2 GiB before the start of the module heap.


Remediation

Install update from vendor's website.