CVE-2025-69261

NameCVE-2025-69261
DescriptionWasmEdge is a WebAssembly runtime. Prior to version 0.16.0-alpha.3, a multiplication in `WasmEdge/include/runtime/instance/memory.h` can wrap, causing `checkAccessBound()` to incorrectly allow the access. This leads to a segmentation fault. Version 0.16.0-alpha.3 contains a patch for the issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1124376

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wasmedge (PTS)trixie0.14.1+dfsg-3.1vulnerable
forky, sid0.16.1+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wasmedgesource(unstable)0.16.0+dfsg-11124376

Notes

[trixie] - wasmedge <no-dsa> (Minor issue)
https://github.com/WasmEdge/WasmEdge/security/advisories/GHSA-89fm-8mr7-gg4m
Fixed by: https://github.com/WasmEdge/WasmEdge/commit/37cc9fa19bd23edbbdaa9252059b17f191fa4d17 (0.16.0-alpha.3)

Search for package or bug name: Reporting problems