Bug 2433491 (CVE-2026-24116) - CVE-2026-24116 wasmtime: Wasmtime segfault or unused out-of-sandbox load with f64.copysign operator on x86-64
Summary: CVE-2026-24116 wasmtime: Wasmtime segfault or unused out-of-sandbox load with...
Keywords:
Status: NEW
Alias: CVE-2026-24116
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2434792 2434793
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-27 20:02 UTC by OSIDB Bzimport
Modified: 2026-01-28 21:35 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-01-27 20:02:33 UTC
Wasmtime is a runtime for WebAssembly. Starting in version 29.0.0 and prior to version 36.0.5, 40.0.3, and 41.0.1, on x86-64 platforms with AVX, Wasmtime's compilation of the `f64.copysign` WebAssembly instruction with Cranelift may load 8 more bytes than is necessary. When signals-based-traps are disabled this can result in a uncaught segfault due to loading from unmapped guard pages. With guard pages disabled it's possible for out-of-sandbox data to be loaded, but unless there is another bug in Cranelift this data is not visible to WebAssembly guests. Wasmtime 36.0.5, 40.0.3, and 41.0.1 have been released to fix this issue. Users are recommended to upgrade to the patched versions of Wasmtime. Other affected versions are not patched and users should updated to supported major version instead. This bug can be worked around by enabling signals-based-traps. While disabling guard pages can be a quick fix in some situations, it's not recommended to disabled guard pages as it is a key defense-in-depth measure of Wasmtime.


Note You need to log in before you can comment on or make changes to this bug.