CVE-2024-28123

Wasmi is an efficient and lightweight WebAssembly interpreter with a focus on constrained and embedded systems. In the WASMI Interpreter, an Out-of-bounds Buffer Write will arise if the host calls or resumes a Wasm function with more parameters than the default limit (128), as it will surpass the stack value. This doesn’t affect calls from Wasm to Wasm, only from host to Wasm. This vulnerability was patched in version 0.31.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:*

History

02 Jun 2025, 14:06

Type Values Removed Values Added
References () https://github.com/wasmi-labs/wasmi/commit/f7b3200e9f3dc9e2cbca966cb255c228453c792f - () https://github.com/wasmi-labs/wasmi/commit/f7b3200e9f3dc9e2cbca966cb255c228453c792f - Patch
References () https://github.com/wasmi-labs/wasmi/releases/tag/v0.31.1 - () https://github.com/wasmi-labs/wasmi/releases/tag/v0.31.1 - Release Notes
References () https://github.com/wasmi-labs/wasmi/security/advisories/GHSA-75jp-vq8x-h4cq - () https://github.com/wasmi-labs/wasmi/security/advisories/GHSA-75jp-vq8x-h4cq - Vendor Advisory
CPE cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:*
First Time Wasmi-labs
Wasmi-labs wasmi

21 Nov 2024, 09:05

Type Values Removed Values Added
References () https://github.com/wasmi-labs/wasmi/commit/f7b3200e9f3dc9e2cbca966cb255c228453c792f - () https://github.com/wasmi-labs/wasmi/commit/f7b3200e9f3dc9e2cbca966cb255c228453c792f -
References () https://github.com/wasmi-labs/wasmi/releases/tag/v0.31.1 - () https://github.com/wasmi-labs/wasmi/releases/tag/v0.31.1 -
References () https://github.com/wasmi-labs/wasmi/security/advisories/GHSA-75jp-vq8x-h4cq - () https://github.com/wasmi-labs/wasmi/security/advisories/GHSA-75jp-vq8x-h4cq -
Summary
  • (es) Wasmi es un intérprete de WebAssembly eficiente y liviano centrado en sistemas integrados y restringidos. En el intérprete WASMI, surgirá una escritura de búfer fuera de los límites si el host llama o reanuda una función Wasm con más parámetros que el límite predeterminado (128), ya que superará el valor de la pila. Esto no afecta las llamadas de Wasm a Wasm, solo del host a Wasm. Esta vulnerabilidad fue parcheada en la versión 0.31.1.

21 Mar 2024, 02:52

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-21 02:52

Updated : 2025-06-02 14:06


NVD link : CVE-2024-28123

Mitre link : CVE-2024-28123

CVE.ORG link : CVE-2024-28123


JSON object : View

Products Affected

wasmi-labs

  • wasmi
CWE
CWE-787

Out-of-bounds Write