Uninitialized Memory Exposure Affecting cranelift-codegen package, versions <0.73.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.08% (37th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-CRANELIFTCODEGEN-1296552
  • published25 May 2021
  • disclosed25 May 2021
  • creditUnknown

Introduced: 25 May 2021

CVE-2021-32629  (opens in a new tab)
CWE-201  (opens in a new tab)

How to fix?

Upgrade cranelift-codegen to version 0.73.1 or higher.

Overview

cranelift-codegen is a translates code from an intermediate representation into executable machine code.

Affected versions of this package are vulnerable to Uninitialized Memory Exposure. A bug in the x64 backend can create a scenario that could result in a potential sandbox escape in a WebAssembly module. This bug performs a sign-extend instead of a zero-extend on a value loaded from the stack, under a specific set of circumstances. If those circumstances occur, the bug could allow access to memory addresses up to 2GiB before the start of the heap allocated for the WebAssembly module.

CVSS Scores

version 3.1