You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
CRITICAL: Fixed a critical vulnerability in the Wasmi engine executor.
The bug causes an out of bounds buffer write when calling or resuming
a Wasm function with more than 128 parameters from the host side.
Affected users:
Users of Wasmi that use functions with more than 128 parameters
and call those Wasm functions from their own host side. This is
a very unlikely scenario since functions with such a high number
of parameters are rather rare.
Users of Wasmi that allow external users to call Wasm functions
with more than 128 parameters from the host side. This is a serious
attack vector that is enabled by this vulnerability and which this
fix closes.
Special note: Users of the pallet_contracts such as Polkadot are not
affected by this vulnerability since host to Wasm function calls with
more than 128 parameters is not possible.