Arbitrary Memory Access Vulnerability in Wasmtime WebAssembly Runtime
CVE-2026-34971
What is CVE-2026-34971?
Wasmtime, a runtime for WebAssembly, contains a vulnerability stemming from a bug in the Cranelift compilation backend that allows for arbitrary read/write access to host memory. This issue arises when performing specific heap accesses on aarch64 architecture, where incorrect bounds checks can enable a malicious guest WebAssembly module to bypass sandbox restrictions. The miscompiled load operation can lead to unauthorized memory access, which poses significant security risks. Mitigations related to Spectre must be properly configured to avoid this vulnerability. It is crucial for users to upgrade to version 36.0.7, 42.0.2, or 43.0.1 to protect against this threat.
Affected Version(s)
wasmtime >= 32.0.0, < 36.0.7 < 32.0.0, 36.0.7
wasmtime >= 37.0.0, < 42.0.2 < 37.0.0, 42.0.2
wasmtime >= 43.0.0, < 44.0.1 < 43.0.0, 44.0.1
