<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom"><title>RustSec Advisories</title><id>https://rustsec.org/feed.xml</id><updated>2026-04-11T12:00:00+00:00</updated><author><name>RustSec</name></author><icon>https://rustsec.org/favicon.ico</icon><link href="https://rustsec.org/feed.xml" rel="self" type="application/atom+xml"/><link href="https://rustsec.org/" rel="alternate" type="text/html"/><subtitle xml:lang="en">Security advisories filed against Rust crates</subtitle><entry><title>RUSTSEC-2026-0097: Unsoundness in rand</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0097.html</id><updated>2026-04-11T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0097.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0097: Unsoundness in rand"/><published>2026-04-11T12:00:00+00:00</published><summary xml:lang="en">Rand is unsound with a custom logger using `rand::rng()`</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/rand/RUSTSEC-2026-0097.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/rand/RUSTSEC-2026-0097.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0097&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0097
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;Rand is unsound with a custom logger using &lt;code&gt;rand::rng()&lt;/code&gt;&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-11&quot;&gt;
          April 11, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/rand.html&quot;&gt;rand&lt;/a&gt;
           
          (&lt;a href=&quot;https://crates.io/crates/rand&quot;&gt;crates.io&lt;/a&gt;)
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;span class=&quot;tag info&quot;&gt;INFO&lt;/span&gt;
        Unsound
        
      &lt;/dd&gt;

      

      

      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/rust-random/rand/pull/1763&quot;&gt;
              https://github.com/rust-random/rand/pull/1763
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=0.10.1&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#60;0.10.0, &amp;#62;=0.9.3&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      
      &lt;dt id=&quot;unaffected&quot;&gt;Unaffected&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#60;0.7.0&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      

      
      
    &lt;/dl&gt;

    
    
    &lt;dl&gt;
      &lt;dt&gt;Affected Functions&lt;/dt&gt;
      &lt;dd&gt;Version&lt;/dd&gt;
      
      &lt;dt&gt;&lt;code&gt;rand::rng&lt;/code&gt;&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=0.9.0&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      
      &lt;dt&gt;&lt;code&gt;rand::thread_rng&lt;/code&gt;&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#60;0.10.0, &amp;#62;=0.7.0&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      
    &lt;/dl&gt;
    

    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;It has been reported (by @lopopolo) that the &lt;code&gt;rand&lt;/code&gt; library is &lt;a href=&quot;https://rust-lang.github.io/unsafe-code-guidelines/glossary.html#soundness-of-code--of-a-library&quot;&gt;unsound&lt;/a&gt; (i.e. that safe code using the public API can cause Undefined Behaviour) when all the following conditions are met:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The &lt;code&gt;log&lt;/code&gt; and &lt;code&gt;thread_rng&lt;/code&gt; features are enabled&lt;/li&gt;
&lt;li&gt;A &lt;a href=&quot;https://docs.rs/log/latest/log/#implementing-a-logger&quot;&gt;custom logger&lt;/a&gt; is defined&lt;/li&gt;
&lt;li&gt;The custom logger accesses &lt;code&gt;rand::rng()&lt;/code&gt; (previously &lt;code&gt;rand::thread_rng()&lt;/code&gt;) and calls any &lt;code&gt;TryRng&lt;/code&gt; (previously &lt;code&gt;RngCore&lt;/code&gt;) methods on &lt;code&gt;ThreadRng&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;The &lt;code&gt;ThreadRng&lt;/code&gt; (attempts to) reseed while called from the custom logger (this happens every 64 kB of generated data)&lt;/li&gt;
&lt;li&gt;Trace-level logging is enabled or warn-level logging is enabled and the random source (the &lt;code&gt;getrandom&lt;/code&gt; crate) is unable to provide a new seed&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;code&gt;TryRng&lt;/code&gt; (previously &lt;code&gt;RngCore&lt;/code&gt;) methods for &lt;code&gt;ThreadRng&lt;/code&gt; use &lt;code&gt;unsafe&lt;/code&gt; code to cast &lt;code&gt;*mut BlockRng&amp;lt;ReseedingCore&amp;gt;&lt;/code&gt; to &lt;code&gt;&amp;amp;mut BlockRng&amp;lt;ReseedingCore&amp;gt;&lt;/code&gt;. When all the above conditions are met this results in an aliased mutable reference, violating the Stacked Borrows rules. Miri is able to detect this violation in sample code. Since construction of &lt;a href=&quot;https://doc.rust-lang.org/stable/nomicon/references.html&quot;&gt;aliased mutable references is Undefined Behaviour&lt;/a&gt;, the behaviour of optimized builds is hard to predict.&lt;/p&gt;
&lt;p&gt;Affected versions of &lt;code&gt;rand&lt;/code&gt; are &lt;code&gt;&amp;gt;= 0.7, &amp;lt; 0.9.3&lt;/code&gt; and &lt;code&gt;0.10.0&lt;/code&gt;.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0095: Vulnerability in wasmtime</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0095.html</id><updated>2026-04-09T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0095.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0095: Vulnerability in wasmtime"/><published>2026-04-09T12:00:00+00:00</published><summary xml:lang="en">Wasmtime with Winch compiler backend may allow a sandbox-escaping memory access</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/wasmtime/RUSTSEC-2026-0095.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/wasmtime/RUSTSEC-2026-0095.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0095&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0095
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;Wasmtime with Winch compiler backend may allow a sandbox-escaping memory access&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/wasmtime.html&quot;&gt;wasmtime&lt;/a&gt;
           
          (&lt;a href=&quot;https://crates.io/crates/wasmtime&quot;&gt;crates.io&lt;/a&gt;)
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34987&quot;&gt;CVE-2026-34987&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-xx5w-cvp6-jv83&quot;&gt;GHSA-xx5w-cvp6-jv83&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-xx5w-cvp6-jv83&quot;&gt;
              https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-xx5w-cvp6-jv83
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;9 &lt;span class=&quot;tag critical&quot;&gt;
        CRITICAL
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;Present&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Network&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H&quot;&gt;CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=36.0.7, &amp;#60;37.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=42.0.2, &amp;#60;43.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=43.0.1&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;This is an entry in the RustSec database for the Wasmtime security advisory
located at
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-xx5w-cvp6-jv83
For more information see the GitHub-hosted security advisory.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0092: Vulnerability in wasmtime</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0092.html</id><updated>2026-04-09T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0092.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0092: Vulnerability in wasmtime"/><published>2026-04-09T12:00:00+00:00</published><summary xml:lang="en">Panic when transcoding misaligned component model UTF-16 strings</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/wasmtime/RUSTSEC-2026-0092.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/wasmtime/RUSTSEC-2026-0092.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0092&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0092
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;Panic when transcoding misaligned component model UTF-16 strings&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/wasmtime.html&quot;&gt;wasmtime&lt;/a&gt;
           
          (&lt;a href=&quot;https://crates.io/crates/wasmtime&quot;&gt;crates.io&lt;/a&gt;)
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34942&quot;&gt;CVE-2026-34942&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-jxhv-7h78-9775&quot;&gt;GHSA-jxhv-7h78-9775&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-jxhv-7h78-9775&quot;&gt;
              https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-jxhv-7h78-9775
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;5.9 &lt;span class=&quot;tag medium&quot;&gt;
        MEDIUM
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;Present&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Network&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;Passive&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L&quot;&gt;CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=24.0.7, &amp;#60;25.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=36.0.7, &amp;#60;37.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=42.0.2, &amp;#60;43.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=43.0.1&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;This is an entry in the RustSec database for the Wasmtime security advisory
located at
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-jxhv-7h78-9775
For more information see the GitHub-hosted security advisory.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0089: Vulnerability in wasmtime</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0089.html</id><updated>2026-04-09T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0089.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0089: Vulnerability in wasmtime"/><published>2026-04-09T12:00:00+00:00</published><summary xml:lang="en">Host panic when Winch compiler executes `table.fill`</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/wasmtime/RUSTSEC-2026-0089.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/wasmtime/RUSTSEC-2026-0089.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0089&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0089
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;Host panic when Winch compiler executes &lt;code&gt;table.fill&lt;/code&gt;&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/wasmtime.html&quot;&gt;wasmtime&lt;/a&gt;
           
          (&lt;a href=&quot;https://crates.io/crates/wasmtime&quot;&gt;crates.io&lt;/a&gt;)
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34946&quot;&gt;CVE-2026-34946&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-q49f-xg75-m9xw&quot;&gt;GHSA-q49f-xg75-m9xw&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-q49f-xg75-m9xw&quot;&gt;
              https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-q49f-xg75-m9xw
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;5.9 &lt;span class=&quot;tag medium&quot;&gt;
        MEDIUM
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;Present&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Network&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;Passive&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N&quot;&gt;CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=36.0.7, &amp;#60;37.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=42.0.2, &amp;#60;43.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=43.0.1&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;This is an entry in the RustSec database for the Wasmtime security advisory
located at
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-q49f-xg75-m9xw
For more information see the GitHub-hosted security advisory.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0096: Vulnerability in wasmtime</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0096.html</id><updated>2026-04-09T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0096.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0096: Vulnerability in wasmtime"/><published>2026-04-09T12:00:00+00:00</published><summary xml:lang="en">Miscompiled guest heap access enables sandbox escape on aarch64 Cranelift</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/wasmtime/RUSTSEC-2026-0096.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/wasmtime/RUSTSEC-2026-0096.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0096&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0096
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;Miscompiled guest heap access enables sandbox escape on aarch64 Cranelift&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/wasmtime.html&quot;&gt;wasmtime&lt;/a&gt;
           
          (&lt;a href=&quot;https://crates.io/crates/wasmtime&quot;&gt;crates.io&lt;/a&gt;)
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34971&quot;&gt;CVE-2026-34971&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-jhxm-h53p-jm7w&quot;&gt;GHSA-jhxm-h53p-jm7w&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-jhxm-h53p-jm7w&quot;&gt;
              https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-jhxm-h53p-jm7w
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;9 &lt;span class=&quot;tag critical&quot;&gt;
        CRITICAL
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;Present&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Network&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H&quot;&gt;CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=36.0.7, &amp;#60;37.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=42.0.2, &amp;#60;43.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=43.0.1&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;This is an entry in the RustSec database for the Wasmtime security advisory
located at
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-jhxm-h53p-jm7w
For more information see the GitHub-hosted security advisory.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0090: Vulnerability in wasmtime</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0090.html</id><updated>2026-04-09T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0090.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0090: Vulnerability in wasmtime"/><published>2026-04-09T12:00:00+00:00</published><summary xml:lang="en">Use-after-free bug after cloning `wasmtime::Linker`</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/wasmtime/RUSTSEC-2026-0090.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/wasmtime/RUSTSEC-2026-0090.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0090&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0090
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;Use-after-free bug after cloning &lt;code&gt;wasmtime::Linker&lt;/code&gt;&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/wasmtime.html&quot;&gt;wasmtime&lt;/a&gt;
           
          (&lt;a href=&quot;https://crates.io/crates/wasmtime&quot;&gt;crates.io&lt;/a&gt;)
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34983&quot;&gt;CVE-2026-34983&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-hfr4-7c6c-48w2&quot;&gt;GHSA-hfr4-7c6c-48w2&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hfr4-7c6c-48w2&quot;&gt;
              https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hfr4-7c6c-48w2
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;1 &lt;span class=&quot;tag low&quot;&gt;
        LOW
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;Present&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Physical&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;Active&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:P/AC:H/AT:P/PR:H/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N&quot;&gt;CVSS:4.0/AV:P/AC:H/AT:P/PR:H/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=43.0.1&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      
      &lt;dt id=&quot;unaffected&quot;&gt;Unaffected&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#60;43.0.0&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;This is an entry in the RustSec database for the Wasmtime security advisory
located at
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hfr4-7c6c-48w2
For more information see the GitHub-hosted security advisory.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0088: Vulnerability in wasmtime</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0088.html</id><updated>2026-04-09T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0088.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0088: Vulnerability in wasmtime"/><published>2026-04-09T12:00:00+00:00</published><summary xml:lang="en">Data leakage between pooling allocator instances</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/wasmtime/RUSTSEC-2026-0088.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/wasmtime/RUSTSEC-2026-0088.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0088&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0088
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;Data leakage between pooling allocator instances&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/wasmtime.html&quot;&gt;wasmtime&lt;/a&gt;
           
          (&lt;a href=&quot;https://crates.io/crates/wasmtime&quot;&gt;crates.io&lt;/a&gt;)
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34988&quot;&gt;CVE-2026-34988&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-6wgr-89rj-399p&quot;&gt;GHSA-6wgr-89rj-399p&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-6wgr-89rj-399p&quot;&gt;
              https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-6wgr-89rj-399p
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;2.3 &lt;span class=&quot;tag low&quot;&gt;
        LOW
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;Present&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Network&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N&quot;&gt;CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=36.0.7, &amp;#60;37.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=42.0.2, &amp;#60;43.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=43.0.1&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;This is an entry in the RustSec database for the Wasmtime security advisory
located at
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-6wgr-89rj-399p
For more information see the GitHub-hosted security advisory.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0093: Vulnerability in wasmtime</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0093.html</id><updated>2026-04-09T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0093.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0093: Vulnerability in wasmtime"/><published>2026-04-09T12:00:00+00:00</published><summary xml:lang="en">Heap OOB read in component model UTF-16 to latin1+utf16 string transcoding</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/wasmtime/RUSTSEC-2026-0093.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/wasmtime/RUSTSEC-2026-0093.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0093&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0093
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;Heap OOB read in component model UTF-16 to latin1+utf16 string transcoding&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/wasmtime.html&quot;&gt;wasmtime&lt;/a&gt;
           
          (&lt;a href=&quot;https://crates.io/crates/wasmtime&quot;&gt;crates.io&lt;/a&gt;)
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34941&quot;&gt;CVE-2026-34941&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-hx6p-xpx3-jvvv&quot;&gt;GHSA-hx6p-xpx3-jvvv&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hx6p-xpx3-jvvv&quot;&gt;
              https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hx6p-xpx3-jvvv
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;6.9 &lt;span class=&quot;tag medium&quot;&gt;
        MEDIUM
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Network&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;Passive&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N&quot;&gt;CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=24.0.7, &amp;#60;25.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=36.0.7, &amp;#60;37.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=42.0.2, &amp;#60;43.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=43.0.1&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;This is an entry in the RustSec database for the Wasmtime security advisory
located at
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hx6p-xpx3-jvvv
For more information see the GitHub-hosted security advisory.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0094: Vulnerability in wasmtime</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0094.html</id><updated>2026-04-09T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0094.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0094: Vulnerability in wasmtime"/><published>2026-04-09T12:00:00+00:00</published><summary xml:lang="en">Improperly masked return value from `table.grow` with Winch compiler backend</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/wasmtime/RUSTSEC-2026-0094.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/wasmtime/RUSTSEC-2026-0094.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0094&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0094
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;Improperly masked return value from &lt;code&gt;table.grow&lt;/code&gt; with Winch compiler backend&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/wasmtime.html&quot;&gt;wasmtime&lt;/a&gt;
           
          (&lt;a href=&quot;https://crates.io/crates/wasmtime&quot;&gt;crates.io&lt;/a&gt;)
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35186&quot;&gt;CVE-2026-35186&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-f984-pcp8-v2p7&quot;&gt;GHSA-f984-pcp8-v2p7&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-f984-pcp8-v2p7&quot;&gt;
              https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-f984-pcp8-v2p7
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;6.1 &lt;span class=&quot;tag medium&quot;&gt;
        MEDIUM
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;Present&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Network&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N&quot;&gt;CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=36.0.7, &amp;#60;37.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=42.0.2, &amp;#60;43.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=43.0.1&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;This is an entry in the RustSec database for the Wasmtime security advisory
located at
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-f984-pcp8-v2p7
For more information see the GitHub-hosted security advisory.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0086: Vulnerability in wasmtime</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0086.html</id><updated>2026-04-09T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0086.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0086: Vulnerability in wasmtime"/><published>2026-04-09T12:00:00+00:00</published><summary xml:lang="en">Host data leakage with 64-bit tables and Winch</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/wasmtime/RUSTSEC-2026-0086.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/wasmtime/RUSTSEC-2026-0086.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0086&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0086
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;Host data leakage with 64-bit tables and Winch&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/wasmtime.html&quot;&gt;wasmtime&lt;/a&gt;
           
          (&lt;a href=&quot;https://crates.io/crates/wasmtime&quot;&gt;crates.io&lt;/a&gt;)
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34945&quot;&gt;CVE-2026-34945&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-m9w2-8782-2946&quot;&gt;GHSA-m9w2-8782-2946&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-m9w2-8782-2946&quot;&gt;
              https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-m9w2-8782-2946
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;2.3 &lt;span class=&quot;tag low&quot;&gt;
        LOW
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;Present&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Network&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N&quot;&gt;CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=36.0.7, &amp;#60;37.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=42.0.2, &amp;#60;43.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=43.0.1&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;This is an entry in the RustSec database for the Wasmtime security advisory
located at
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-m9w2-8782-2946
For more information see the GitHub-hosted security advisory.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0091: Vulnerability in wasmtime</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0091.html</id><updated>2026-04-09T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0091.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0091: Vulnerability in wasmtime"/><published>2026-04-09T12:00:00+00:00</published><summary xml:lang="en">Out-of-bounds write or crash when transcoding component model strings</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/wasmtime/RUSTSEC-2026-0091.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/wasmtime/RUSTSEC-2026-0091.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0091&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0091
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;Out-of-bounds write or crash when transcoding component model strings&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/wasmtime.html&quot;&gt;wasmtime&lt;/a&gt;
           
          (&lt;a href=&quot;https://crates.io/crates/wasmtime&quot;&gt;crates.io&lt;/a&gt;)
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35195&quot;&gt;CVE-2026-35195&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-394w-hwhg-8vgm&quot;&gt;GHSA-394w-hwhg-8vgm&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-394w-hwhg-8vgm&quot;&gt;
              https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-394w-hwhg-8vgm
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;6.1 &lt;span class=&quot;tag medium&quot;&gt;
        MEDIUM
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;Present&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Network&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N&quot;&gt;CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=24.0.7, &amp;#60;25.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=36.0.7, &amp;#60;37.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=42.0.2, &amp;#60;43.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=43.0.1&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;This is an entry in the RustSec database for the Wasmtime security advisory
located at
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-394w-hwhg-8vgm
For more information see the GitHub-hosted security advisory.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0085: Vulnerability in wasmtime</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0085.html</id><updated>2026-04-09T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0085.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0085: Vulnerability in wasmtime"/><published>2026-04-09T12:00:00+00:00</published><summary xml:lang="en">Panic when lifting `flags` component value</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/wasmtime/RUSTSEC-2026-0085.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/wasmtime/RUSTSEC-2026-0085.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0085&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0085
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;Panic when lifting &lt;code&gt;flags&lt;/code&gt; component value&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/wasmtime.html&quot;&gt;wasmtime&lt;/a&gt;
           
          (&lt;a href=&quot;https://crates.io/crates/wasmtime&quot;&gt;crates.io&lt;/a&gt;)
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34943&quot;&gt;CVE-2026-34943&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-m758-wjhj-p3jq&quot;&gt;GHSA-m758-wjhj-p3jq&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-m758-wjhj-p3jq&quot;&gt;
              https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-m758-wjhj-p3jq
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;5.6 &lt;span class=&quot;tag medium&quot;&gt;
        MEDIUM
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;Present&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Network&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;Active&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N&quot;&gt;CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=24.0.7, &amp;#60;25.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=36.0.7, &amp;#60;37.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=42.0.2, &amp;#60;43.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=43.0.1&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;This is an entry in the RustSec database for the Wasmtime security advisory
located at
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-m758-wjhj-p3jq
For more information see the GitHub-hosted security advisory.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0087: Vulnerability in wasmtime</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0087.html</id><updated>2026-04-09T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0087.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0087: Vulnerability in wasmtime"/><published>2026-04-09T12:00:00+00:00</published><summary xml:lang="en">Wasmtime segfault or unused out-of-sandbox load with `f64x2.splat` operator on Cranelift x86-64</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/wasmtime/RUSTSEC-2026-0087.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/wasmtime/RUSTSEC-2026-0087.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0087&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0087
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;Wasmtime segfault or unused out-of-sandbox load with &lt;code&gt;f64x2.splat&lt;/code&gt; operator on Cranelift x86-64&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/wasmtime.html&quot;&gt;wasmtime&lt;/a&gt;
           
          (&lt;a href=&quot;https://crates.io/crates/wasmtime&quot;&gt;crates.io&lt;/a&gt;)
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34944&quot;&gt;CVE-2026-34944&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-qqfj-4vcm-26hv&quot;&gt;GHSA-qqfj-4vcm-26hv&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-qqfj-4vcm-26hv&quot;&gt;
              https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-qqfj-4vcm-26hv
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;4.1 &lt;span class=&quot;tag medium&quot;&gt;
        MEDIUM
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;Present&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Local&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;Active&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N&quot;&gt;CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=24.0.7, &amp;#60;25.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=36.0.7, &amp;#60;37.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=42.0.2, &amp;#60;43.0.0&lt;/code&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=43.0.1&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;This is an entry in the RustSec database for the Wasmtime security advisory
located at
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-qqfj-4vcm-26hv
For more information see the GitHub-hosted security advisory.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0084: Vulnerability in logprinter</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0084.html</id><updated>2026-04-09T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0084.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0084: Vulnerability in logprinter"/><published>2026-04-09T12:00:00+00:00</published><summary xml:lang="en">`logprinter` was removed from crates.io for malicious code</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/logprinter/RUSTSEC-2026-0084.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/logprinter/RUSTSEC-2026-0084.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0084&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0084
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;&lt;code&gt;logprinter&lt;/code&gt; was removed from crates.io for malicious code&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-09&quot;&gt;
          April  9, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/logprinter.html&quot;&gt;logprinter&lt;/a&gt;
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
        
          &lt;li&gt;
            &lt;a href=&quot;https://socket.dev/supply-chain-attacks/north-korea-s-contagious-interview-campaign&quot;&gt;
              https://socket.dev/supply-chain-attacks/north-korea-s-contagious-interview-campaign
            &lt;/a&gt;
          &lt;/li&gt;
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        no patched versions
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;The crate downloaded code from an external HTTP endpoint and executed it within its &lt;code&gt;trace()&lt;/code&gt; fn.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0082: zantetsu-ffi is unmaintained</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0082.html</id><updated>2026-04-08T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0082.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0082: zantetsu-ffi is unmaintained"/><published>2026-04-08T12:00:00+00:00</published><summary xml:lang="en">zantetsu-ffi is unmaintained</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/zantetsu-ffi/RUSTSEC-2026-0082.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/zantetsu-ffi/RUSTSEC-2026-0082.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0082&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0082
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;zantetsu-ffi is unmaintained&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-07&quot;&gt;
          April  7, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-08&quot;&gt;
          April  8, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/zantetsu-ffi.html&quot;&gt;zantetsu-ffi&lt;/a&gt;
           
          (&lt;a href=&quot;https://crates.io/crates/zantetsu-ffi&quot;&gt;crates.io&lt;/a&gt;)
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;span class=&quot;tag info&quot;&gt;INFO&lt;/span&gt;
        Unmaintained
        
      &lt;/dd&gt;

      

      

      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/enrell/psyche/issues/1&quot;&gt;
              https://github.com/enrell/psyche/issues/1
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        no patched versions
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;The &lt;code&gt;zantetsu-ffi&lt;/code&gt; crate is no longer maintained. The Node.js, Python, and C
FFI bindings it provided were removed as part of the zantetsu 0.2 release,
which refocused the project on its core Rust library.&lt;/p&gt;
&lt;p&gt;A tombstone version (0.2.0) has been published and 0.1.4 has been yanked.
There is no replacement for &lt;code&gt;zantetsu-ffi&lt;/code&gt;.&lt;/p&gt;
&lt;h2&gt;Migration&lt;/h2&gt;
&lt;p&gt;If you were using &lt;code&gt;zantetsu-ffi&lt;/code&gt; for anime filename parsing, no direct
equivalent is available. If your project is Rust-based, switch to
&lt;a href=&quot;https://crates.io/crates/zantetsu&quot;&gt;&lt;code&gt;zantetsu 0.2&lt;/code&gt;&lt;/a&gt;.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0083: zantetsu-trainer is unmaintained</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0083.html</id><updated>2026-04-08T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0083.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0083: zantetsu-trainer is unmaintained"/><published>2026-04-08T12:00:00+00:00</published><summary xml:lang="en">zantetsu-trainer is unmaintained</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/zantetsu-trainer/RUSTSEC-2026-0083.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/zantetsu-trainer/RUSTSEC-2026-0083.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0083&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0083
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;zantetsu-trainer is unmaintained&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-07&quot;&gt;
          April  7, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-08&quot;&gt;
          April  8, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/zantetsu-trainer.html&quot;&gt;zantetsu-trainer&lt;/a&gt;
           
          (&lt;a href=&quot;https://crates.io/crates/zantetsu-trainer&quot;&gt;crates.io&lt;/a&gt;)
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;span class=&quot;tag info&quot;&gt;INFO&lt;/span&gt;
        Unmaintained
        
      &lt;/dd&gt;

      

      

      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/enrell/psyche/issues/1&quot;&gt;
              https://github.com/enrell/psyche/issues/1
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        no patched versions
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;The &lt;code&gt;zantetsu-trainer&lt;/code&gt; crate is no longer maintained. The ML training
infrastructure it contained was removed as part of the zantetsu 0.2 release,
which replaced the neural parser with a pure heuristic engine.&lt;/p&gt;
&lt;p&gt;A tombstone version (0.2.0) has been published and 0.1.4 has been yanked.
There is no replacement for &lt;code&gt;zantetsu-trainer&lt;/code&gt;.&lt;/p&gt;
&lt;h2&gt;Migration&lt;/h2&gt;
&lt;p&gt;If you were using &lt;code&gt;zantetsu-trainer&lt;/code&gt; as part of a zantetsu-based filename
parsing pipeline, switch to &lt;a href=&quot;https://crates.io/crates/zantetsu&quot;&gt;&lt;code&gt;zantetsu 0.2&lt;/code&gt;&lt;/a&gt;,
which requires no training step.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0081: logtrace contained malicious code</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0081.html</id><updated>2026-04-05T12:00:00+00:00</updated><category term="malicious"/><link href="https://rustsec.org/advisories/RUSTSEC-2026-0081.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0081: logtrace contained malicious code"/><published>2026-04-05T12:00:00+00:00</published><summary xml:lang="en">`logtrace` was removed from crates.io for malicious code</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/logtrace/RUSTSEC-2026-0081.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/logtrace/RUSTSEC-2026-0081.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0081&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0081
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;&lt;code&gt;logtrace&lt;/code&gt; was removed from crates.io for malicious code&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-05&quot;&gt;
          April  5, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-04-05&quot;&gt;
          April  5, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/logtrace.html&quot;&gt;logtrace&lt;/a&gt;
          
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      
      &lt;dt id=&quot;categories&quot;&gt;Categories&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;&lt;a href=&quot;/categories/malicious.html&quot;&gt;malicious&lt;/a&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      

      

      

      
      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        no patched versions
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;&lt;code&gt;logtrace&lt;/code&gt; appeared to be downloading a RAT.&lt;/p&gt;
&lt;p&gt;The malicious crate had 2 versions published on 2026-04-01 that had a total of 30 downloads. There
were no crates depending on this crate on crates.io.&lt;/p&gt;
&lt;p&gt;Thanks to &lt;a href=&quot;https://socket.dev/&quot;&gt;Socket.dev&lt;/a&gt; for detecting and reporting this to the crates.io team!&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry></feed>