RustSec logo

HistoryEditJSON (OSV)

RUSTSEC-2026-0096

Miscompiled guest heap access enables sandbox escape on aarch64 Cranelift

Reported
Issued
Package
wasmtime (crates.io)
Type
Vulnerability
Aliases
References
CVSS Score
9 CRITICAL
CVSS Details
Attack Complexity
Low
Attack Requirements
Present
Attack Vector
Network
Privileges Required
Low
Availability Impact to the Subsequent System
High
Confidentiality Impact to the Subsequent System
High
Integrity Impact to the Subsequent System
High
User Interaction
None
Availability Impact to the Vulnerable System
High
Confidentiality Impact to the Vulnerable System
High
Integrity Impact to the Vulnerable System
High
CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Patched
  • >=36.0.7, <37.0.0
  • >=42.0.2, <43.0.0
  • >=43.0.1

Description

This is an entry in the RustSec database for the Wasmtime security advisory located at https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-jhxm-h53p-jm7w For more information see the GitHub-hosted security advisory.

Advisory available under CC0-1.0 license.