{"id":"RUSTSEC-2022-0016","summary":"Use after free with `externref`s and epoch interruption in Wasmtime","details":"[Use after free with `externref`s and epoch interruption in Wasmtime](https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-gwc9-348x-qwv2)","aliases":["CVE-2022-24791","GHSA-gwc9-348x-qwv2","RUSTSEC-2022-0099"],"modified":"2025-05-02T08:58:57.044730Z","published":"2022-03-31T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/wasmtime"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2022-0016.html"},{"type":"ADVISORY","url":"https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-gwc9-348x-qwv2"}],"affected":[{"package":{"name":"wasmtime","ecosystem":"crates.io","purl":"pkg:cargo/wasmtime"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.34.0"},{"fixed":"0.34.2"},{"introduced":"0.35.0"},{"fixed":"0.35.2"}]}],"ecosystem_specific":{"affected_functions":null,"affects":{"functions":["wasmtime::Config::epoch_interruption"],"arch":[],"os":[]}},"database_specific":{"informational":null,"source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2022-0016.json","cvss":null,"categories":["memory-corruption","memory-exposure"]}}],"schema_version":"1.7.3"}