Bug 2373935 (CVE-2025-6275) - CVE-2025-6275 wabt: WebAssembly wabt use after free
Summary: CVE-2025-6275 wabt: WebAssembly wabt use after free
Keywords:
Status: NEW
Alias: CVE-2025-6275
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2374059 2374064
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-06-19 20:01 UTC by OSIDB Bzimport
Modified: 2025-06-20 20:41 UTC (History)
5 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-06-19 20:01:13 UTC
A vulnerability was found in WebAssembly wabt up to 1.0.37. It has been declared as problematic. Affected by this vulnerability is the function GetFuncOffset of the file src/interp/binary-reader-interp.cc. The manipulation leads to use after free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. A similar issue reported during the same timeframe was disputed by the code maintainer because it might not affect "real world wasm programs". Therefore, this entry might get disputed as well in the future.


Note You need to log in before you can comment on or make changes to this bug.