DEBIAN-CVE-2026-24116

Source
https://security-tracker.debian.org/tracker/CVE-2026-24116
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24116.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-24116
Upstream
Published
2026-01-27T19:16:16.180Z
Modified
2026-01-28T09:15:45.636593Z
Severity
  • 4.1 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

Wasmtime is a runtime for WebAssembly. Starting in version 29.0.0 and prior to version 36.0.5, 40.0.3, and 41.0.1, on x86-64 platforms with AVX, Wasmtime's compilation of the f64.copysign WebAssembly instruction with Cranelift may load 8 more bytes than is necessary. When signals-based-traps are disabled this can result in a uncaught segfault due to loading from unmapped guard pages. With guard pages disabled it's possible for out-of-sandbox data to be loaded, but unless there is another bug in Cranelift this data is not visible to WebAssembly guests. Wasmtime 36.0.5, 40.0.3, and 41.0.1 have been released to fix this issue. Users are recommended to upgrade to the patched versions of Wasmtime. Other affected versions are not patched and users should updated to supported major version instead. This bug can be worked around by enabling signals-based-traps. While disabling guard pages can be a quick fix in some situations, it's not recommended to disabled guard pages as it is a key defense-in-depth measure of Wasmtime.

References

Affected packages

Debian:14 / rust-wasmtime

Package

Name
rust-wasmtime
Purl
pkg:deb/debian/rust-wasmtime?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

26.*
26.0.1+dfsg-3
26.0.1+dfsg-4
26.0.1+dfsg-5
26.0.1+dfsg-6
26.0.1+dfsg-7
26.0.1+dfsg-8
26.0.1+dfsg-9
26.0.1+dfsg-10
27.*
27.0.0+dfsg-2
27.0.0+dfsg-3
27.0.0+dfsg-4
28.*
28.0.1+dfsg-1
28.0.1+dfsg-2
28.0.1+dfsg-3
29.*
29.0.1+dfsg-1
29.0.1+dfsg-2
29.0.1+dfsg-3
29.0.1+dfsg-4
29.0.1+dfsg-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24116.json"