Wasmi is an efficient and lightweight WebAssembly interpreter with a focus on constrained and embedded systems. In the WASMI Interpreter, an Out-of-bounds Buffer Write will arise if the host calls or resumes a Wasm function with more parameters than the default limit (128), as it will surpass the stack value. This doesn’t affect calls from Wasm to Wasm, only from host to Wasm. This vulnerability was patched in version 0.31.1.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0852 | Wasmi Out-of-bounds Write for host to Wasm calls with more than 128 Parameters |
Github GHSA |
GHSA-75jp-vq8x-h4cq | Wasmi Out-of-bounds Write for host to Wasm calls with more than 128 Parameters |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 02 Jun 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wasmi-labs
Wasmi-labs wasmi |
|
| CPEs | cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:* | |
| Vendors & Products |
Wasmi-labs
Wasmi-labs wasmi |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-05T18:14:48.975Z
Reserved: 2024-03-04T14:19:14.060Z
Link: CVE-2024-28123
Updated: 2024-08-02T00:48:49.456Z
Status : Analyzed
Published: 2024-03-21T02:52:23.827
Modified: 2025-06-02T14:06:34.380
Link: CVE-2024-28123
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA