Description
Wasmtime is a runtime for WebAssembly. In 43.0.0, cloning a wasmtime::Linker is unsound and can result in use-after-free bugs. This bug is not controllable by guest Wasm programs. It can only be triggered by a specific sequence of embedder API calls made by the host. Specifically, the following steps must occur to trigger the bug clone a wasmtime::Linker, drop the original linker instance, use the new, cloned linker instance, resulting in a use-after-free. This vulnerability is fixed in 43.0.1.
INFO
Published Date :
2026-04-09T18:47:26.575Z
Last Modified :
2026-04-09T18:47:26.575Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-34983 vulnerability.
| Vendors | Products |
|---|---|
| Bytecodealliance |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-34983.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability