SB2022033128 - Use-after-free in Wasmtime
Published: March 31, 2022 Updated: April 23, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 vulnerability.
1) Use-after-free (CVE-ID: CVE-2022-24791)
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to use-after-free in Wasmtime's handling of externref values when running Wasm with epoch interruption enabled. A local user can execute crafted Wasm code that uses externref values to execute arbitrary code.
Only configurations with epoch interruption enabled and the Wasm reference types proposal enabled are vulnerable.
Remediation
Install update from vendor's website.