DEBIAN-CVE-2025-2584

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2025-2584
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-2584.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2025-2584
Upstream
Published
2025-03-21T08:15:11Z
Modified
2025-09-18T05:18:12Z
Summary
[none]
Details

A vulnerability was found in WebAssembly wabt 1.0.36. It has been declared as critical. This vulnerability affects the function BinaryReaderInterp::GetReturnCallDropKeepCount of the file wabt/src/interp/binary-reader-interp.cc. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

References

Affected packages

Debian:11 / wabt

Package

Name
wabt
Purl
pkg:deb/debian/wabt?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / wabt

Package

Name
wabt
Purl
pkg:deb/debian/wabt?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / wabt

Package

Name
wabt
Purl
pkg:deb/debian/wabt?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:14 / wabt

Package

Name
wabt
Purl
pkg:deb/debian/wabt?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "unimportant"
}