DirectorySecurity AdvisoriesPricing
/
Sign in
Security Advisories

CVE-2025-66627

Published

Last updated

NVD

https://nvd.nist.gov/vuln/detail/CVE-2025-66627

Severity

8.4

High

CVSS V3

Summary

Wasmi's Linear Memory has a Critical Use After Free Vulnerability

Description

Wasmi is a WebAssembly interpreter focused on constrained and embedded systems. In versions 0.41.0, 0.41.1, 0.42.0 through 0.47.1, 0.50.0 through 0.51.2 and 1.0.0, Wasmi's linear memory implementation leads to a Use After Free vulnerability, triggered by a WebAssembly module under certain memory growth conditions. This issue potentially leads to memory corruption, information disclosure, or code execution. This issue is fixed in versions 0.41.2, 0.47.1, 0.51.3 and 1.0.1. To workaround this issue, consider limiting the maximum linear memory sizes where feasible.

References

  • https://images.chainguard.dev/security/CGA-2w6c-gf68-6465

Affected packages


The trusted source for open source

Talk to an expert
© 2025 Chainguard. All Rights Reserved.
PrivacyTerms

Product

Chainguard ContainersChainguard LibrariesChainguard VMsIntegrationsPricing