关键漏洞信息 Title wasm3 v0.5.0 and master-branch Memory Corruption Description A critical security vulnerability causes a Segmentation Fault (SEGV) on WRITE within the op_SetSlot_i32 function. The crash is reproducible in RELEASE builds, indicating a memory corruption issue (Out-of-Bounds Write) in production-optimized binaries. Environment OS: Linux x86_64 Compiler: Clang Build Configuration: Release Tools: AddressSanitizer Affected Version: master branch Vulnerability Details Target: Wasm3 Crash Type: Segmentation Fault (SEGV) on WRITE memory access Location: op_SetSlot_i32 (in m3_exec.h or generated core) Crash Address: 0x53100003b188 (Likely a stack guard page or invalid boundary) Root Cause Analysis The stack trace points to op_SetSlot_i32, responsible for writing a 32-bit integer value into a specific slot on the Wasm interpreter stack. The ASAN report states: The signal is caused by a WRITE memory access, suggesting the interpreter failed to validate the slot index or stack boundary before attempting to write data, leading to an Out-of-Bounds Write. This write violation poses a high risk of memory corruption or potential code execution. The Program Counter (PC) is also zero, suggesting the program attempted to call a function using a NULL pointer.