Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. wasmtime
  4. ›
  5. CVE-2026-34944

CVE-2026-34944: Wasmtime segfault or unused out-of-sandbox load with `f64x2.splat` operator on x86-64

April 9, 2026

On x86-64 platforms with SSE3 disabled Wasmtime’s compilation of the f64x2.splat WebAssembly instruction with Cranelift may load 8 more bytes than is necessary. When signals-based-traps are disabled this can result in a uncaught segfault due to loading from unmapped guard pages. With guard pages disabled it’s possible for out-of-sandbox data to be loaded, but this data is not visible to WebAssembly guests.

References

  • github.com/advisories/GHSA-qqfj-4vcm-26hv
  • github.com/bytecodealliance/wasmtime
  • github.com/bytecodealliance/wasmtime/security/advisories/GHSA-qqfj-4vcm-26hv
  • nvd.nist.gov/vuln/detail/CVE-2026-34944

Code Behaviors & Features

Detect and mitigate CVE-2026-34944 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 24.0.7, all versions starting from 25.0.0 before 36.0.7, all versions starting from 37.0.0 before 42.0.2, all versions starting from 43.0.0 before 43.0.1, version 43.0.0

Fixed versions

  • 24.0.7
  • 36.0.7
  • 42.0.2
  • 43.0.1

Solution

Upgrade to versions 24.0.7, 36.0.7, 42.0.2, 43.0.1 or above.

Impact 5 MEDIUM

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-789: Memory Allocation with Excessive Size Value

Source file

cargo/wasmtime/CVE-2026-34944.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 10 Apr 2026 12:17:50 +0000.