| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p8xm-42r7-89xg | wasmtime has a panic when allocating a table exceeding the size of the host's address space |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 18 May 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:* cpe:2.3:a:bytecodealliance:wasmtime:44.0.0:*:*:*:*:rust:*:* |
Sat, 16 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 15 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bytecodealliance
Bytecodealliance wasmtime |
|
| Vendors & Products |
Bytecodealliance
Bytecodealliance wasmtime |
Thu, 14 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wasmtime is a runtime for WebAssembly. From 30.0.0 to 36.0.8, 43.0.2, and 44.0.1, Wasmtime's allocation logic for a WebAssembly table contained checked arithmetic which panicked on overflow. This overflow is possible to trigger, and thus panic, when a table with an extremely large size is allocated. This is possible with the WebAssembly memory64 proposal where tables can have sizes in the 64-bit range as opposed to the previous 32-bit range which would not overflow. The panic happens when attempting to create a very large table, such as when instantiating a WebAssembly module or component. This vulnerability is fixed in 36.0.8, 43.0.2, and 44.0.1. | |
| Title | Wasmtime: Panic when allocating a table exceeding the size of the host's address space | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T19:09:21.141Z
Reserved: 2026-05-05T15:13:47.572Z
Link: CVE-2026-44216
Updated: 2026-05-15T19:08:40.371Z
Status : Analyzed
Published: 2026-05-14T15:16:47.793
Modified: 2026-05-18T13:36:34.053
Link: CVE-2026-44216
OpenCVE Enrichment
Updated: 2026-05-16T02:00:12Z
Github GHSA