CVE-2025-58749

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-58749
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-58749.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-58749
Related
  • GHSA-xj5p-r8jq-pw47
Published
2025-09-16T16:15:42Z
Modified
2025-09-18T04:58:41.235974Z
Summary
[none]
Details

WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. In WAMR versions prior to 2.4.2, when running in LLVM-JIT mode, the runtime cannot exit normally when executing WebAssembly programs containing a memory.fill instruction where the first operand (memory address pointer) is greater than or equal to 2147483648 bytes (2GiB). This causes the runtime to hang in release builds or crash in debug builds due to accessing an invalid pointer. The issue does not occur in FAST-JIT mode or other runtime tools. This has been fixed in version 2.4.2.

References

Affected packages

Git / github.com/bytecodealliance/wasm-micro-runtime

Affected ranges

Type
GIT
Repo
https://github.com/bytecodealliance/wasm-micro-runtime
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

01-12-2020
WAMR-01-18-2022
WAMR-01-29-2021
WAMR-02-18-2020
WAMR-02-27-2020
WAMR-03-05-2020
WAMR-03-19-2020
WAMR-03-25-2021
WAMR-03-30-2020
WAMR-04-15-2020
WAMR-04-15-2021
WAMR-05-18-2022
WAMR-06-15-2020
WAMR-07-10-2020
WAMR-08-10-2021
WAMR-09-08-2020
WAMR-09-29-2020
WAMR-12-30-2021
tag-11-28-2019

WAMR-1.*

WAMR-1.0.0
WAMR-1.1.0
WAMR-1.1.1
WAMR-1.1.2
WAMR-1.2.0
WAMR-1.2.1
WAMR-1.2.2
WAMR-1.2.3
WAMR-1.3.0
WAMR-1.3.1
WAMR-1.3.2

WAMR-2.*

WAMR-2.0.0
WAMR-2.1.0
WAMR-2.1.1
WAMR-2.1.2
WAMR-2.2.0
WAMR-2.3.0
WAMR-2.3.1
WAMR-2.4.0
WAMR-2.4.1

Database specific

{
    "vanir_signatures": [
        {
            "target": {
                "file": "core/iwasm/compilation/aot_emit_memory.c"
            },
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "39552947738572881959337892650897269394",
                    "339071069083586096339718002414474900877",
                    "233289395701922325022677912957227518726",
                    "136790124896477148758985178152416275278",
                    "88138016297672806515087772865420419515",
                    "28262305199493418173426699872621015930",
                    "243775845588338682191792004551199751362",
                    "112016536017145084506879365716143289075",
                    "314942658599442846958876203785057986709"
                ]
            },
            "signature_type": "Line",
            "signature_version": "v1",
            "deprecated": false,
            "id": "CVE-2025-58749-664c4fa3",
            "source": "https://github.com/bytecodealliance/wasm-micro-runtime/commit/95f506a6e77d3ac7588eac7263f95558edfa7f3b"
        },
        {
            "target": {
                "file": "core/iwasm/compilation/aot_emit_memory.c",
                "function": "check_bulk_memory_overflow"
            },
            "digest": {
                "function_hash": "137262882182812274568343392593016771896",
                "length": 3687.0
            },
            "signature_type": "Function",
            "signature_version": "v1",
            "deprecated": false,
            "id": "CVE-2025-58749-c5ae0b9a",
            "source": "https://github.com/bytecodealliance/wasm-micro-runtime/commit/95f506a6e77d3ac7588eac7263f95558edfa7f3b"
        }
    ]
}