Source: rust-wasmtime
Version: 26.0.1+dfsg-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for rust-wasmtime.

CVE-2025-53901[0]:
| Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.4,
| 33.0.2, and 34.0.2, a bug in Wasmtime's implementation of the WASIp1
| set of import functions can lead to a WebAssembly guest inducing a
| panic in the host (embedder). The specific bug is triggered by
| calling `path_open` after calling `fd_renumber` with either two
| equal argument values or a second argument being equal to a
| previously-closed file descriptor number value. The corrupt state
| introduced in `fd_renumber` will lead to the subsequent opening of a
| file descriptor to panic. This panic cannot introduce memory
| unsafety or allow WebAssembly to break outside of its sandbox,
| however. There is no possible heap corruption or memory unsafety
| from this panic. This bug is in the implementation of Wasmtime's
| `wasmtime-wasi` crate which provides an implementation of WASIp1.
| The bug requires a specially crafted call to `fd_renumber` in
| addition to the ability to open a subsequent file descriptor.
| Opening a second file descriptor is only possible when a preopened
| directory was provided to the guest, and this is common amongst
| embeddings. A panic in the host is considered a denial-of-service
| vector for WebAssembly embedders and is thus a security issue in
| Wasmtime. This bug does not affect WASIp2 and embedders using
| components. In accordance with Wasmtime's release process, patch
| releases are available as 24.0.4, 33.0.2, and 34.0.2. Users of other
| release of Wasmtime are recommended to move to a supported release
| of Wasmtime. Embedders who are using components or are not providing
| guest access to create more file descriptors (e.g. via a preopened
| filesystem directory) are not affected by this issue. Otherwise,
| there is no workaround at this time, and affected embeddings are
| recommended to update to a patched version which will not cause a
| panic in the host.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-53901
    https://www.cve.org/CVERecord?id=CVE-2025-53901
[1] 
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-fm79-3f68-h2fc

Regards,
Salvatore

Reply via email to