Improper Handling of Exceptional Conditions The advisory has been revoked - it doesn't affect any version of package cranelift-codegen  (opens in a new tab)


Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-CRANELIFTCODEGEN-13720756
  • published27 Oct 2025
  • disclosed24 Oct 2025
  • creditUnknown

Introduced: 24 Oct 2025

CVE-2025-62711  (opens in a new tab)
CWE-755  (opens in a new tab)

Amendment

This was deemed not a vulnerability.

Overview

cranelift-codegen is a translates code from an intermediate representation into executable machine code.

Affected versions of this package are vulnerable to Improper Handling of Exceptional Conditions via the implementation of component-model related host-to-wasm trampolines. An attacker can cause the host to crash with a segmentation fault or assertion failure by crafting a component and invoking it in a specific manner that abuses the setjmp and longjmp functions in C.

Note: Only embeddings that use or invoke functions with specific component type signatures may be affected.

Note: addressing CVE-2025-62711 for wasmtime required Cranelift refactoring; however Cranelift itself was not vulnerable.