Bug 2352871 (CVE-2025-2368) - CVE-2025-2368 wabt: WebAssembly wabt Malformed File binary-reader-interp.cc OnExport heap-based overflow
Summary: CVE-2025-2368 wabt: WebAssembly wabt Malformed File binary-reader-interp.cc O...
Keywords:
Status: NEW
Alias: CVE-2025-2368
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2355629
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-03-17 09:01 UTC by OSIDB Bzimport
Modified: 2025-06-03 11:20 UTC (History)
5 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-03-17 09:01:08 UTC
A vulnerability was found in WebAssembly wabt 1.0.36 and classified as critical. This issue affects the function wabt::interp::(anonymous namespace)::BinaryReaderInterp::OnExport of the file wabt/src/interp/binary-reader-interp.cc of the component Malformed File Handler. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.

Comment 2 Dominik 'Rathann' Mierzejewski 2025-06-03 11:20:39 UTC
https://github.com/advisories/GHSA-rqch-2mmw-28wc


Note You need to log in before you can comment on or make changes to this bug.