- EPSS 0.01%
- Veröffentlicht 09.04.2026 19:16:24
- Zuletzt bearbeitet 15.04.2026 14:49:52
Wasmtime is a runtime for WebAssembly. In 43.0.0, cloning a wasmtime::Linker is unsound and can result in use-after-free bugs. This bug is not controllable by guest Wasm programs. It can only be triggered by a specific sequence of embedder API calls ...
CVE-2026-34942
- EPSS 0.02%
- Veröffentlicht 09.04.2026 19:16:23
- Zuletzt bearbeitet 20.04.2026 18:28:12
Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime's implementation of transcoding strings into the Component Model's utf16 or latin1+utf16 encodings improperly verified the alignment of reallocated strings. ...
CVE-2026-34941
- EPSS 0.02%
- Veröffentlicht 09.04.2026 19:16:23
- Zuletzt bearbeitet 20.04.2026 18:28:46
Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contains a vulnerability where when transcoding a UTF-16 string to the latin1+utf16 component-model encoding it would incorrectly validate the byte length of...
CVE-2026-27572
- EPSS 0.03%
- Veröffentlicht 24.02.2026 21:31:50
- Zuletzt bearbeitet 25.02.2026 15:36:36
Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of the `wasi:http/types.fields` resource is susceptible to panics when too many fields are added to the set of headers. Was...
CVE-2026-27204
- EPSS 0.09%
- Veröffentlicht 24.02.2026 21:23:47
- Zuletzt bearbeitet 25.02.2026 15:20:51
Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of WASI host interfaces are susceptible to guest-controlled resource exhaustion on the host. Wasmtime did not appropriately...
CVE-2026-27195
- EPSS 0.08%
- Veröffentlicht 24.02.2026 21:15:20
- Zuletzt bearbeitet 25.02.2026 15:20:22
Wasmtime is a runtime for WebAssembly. Starting with Wasmtime 39.0.0, the `component-model-async` feature became the default, which brought with it a new implementation of `[Typed]Func::call_async` which made it capable of calling async-typed guest e...
CVE-2026-24116
- EPSS 0.01%
- Veröffentlicht 27.01.2026 18:58:52
- Zuletzt bearbeitet 12.02.2026 21:36:55
Wasmtime is a runtime for WebAssembly. Starting in version 29.0.0 and prior to version 36.0.5, 40.0.3, and 41.0.1, on x86-64 platforms with AVX, Wasmtime's compilation of the `f64.copysign` WebAssembly instruction with Cranelift may load 8 more bytes...
CVE-2025-64345
- EPSS 0.01%
- Veröffentlicht 12.11.2025 21:25:50
- Zuletzt bearbeitet 15.04.2026 00:35:42
Wasmtime is a runtime for WebAssembly. Prior to version 38.0.4, 37.0.3, 36.0.3, and 24.0.5, Wasmtime's Rust embedder API contains an unsound interaction where a WebAssembly shared linear memory could be viewed as a type which provides safe access to ...
CVE-2025-62711
- EPSS 0.01%
- Veröffentlicht 24.10.2025 21:54:52
- Zuletzt bearbeitet 03.11.2025 19:26:50
Wasmtime is a runtime for WebAssembly. In versions from 38.0.0 to before 38.0.3, the implementation of component-model related host-to-wasm trampolines in Wasmtime contained a bug where it's possible to carefully craft a component, which when called ...
CVE-2025-61670
- EPSS 0.02%
- Veröffentlicht 07.10.2025 18:49:53
- Zuletzt bearbeitet 30.10.2025 14:45:37
Wasmtime is a runtime for WebAssembly. Wasmtime 37.0.0 and 37.0.1 have memory leaks in the C/C++ API when using bindings for the `anyref` or `externref` WebAssembly values. This is caused by a regression introduced during the development of 37.0.0 an...