CVE-2026-34944
mediumCVSS v3 Base Score
4.7
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
Attack Characteristics
Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Confidentiality
None
Integrity
None
Availability
High
Vulnerability Report
Generated by CyberWatcher
Description
A flaw was found in Wasmtime, a runtime for WebAssembly. On x86-64 platforms with SSE3 disabled, Wasmtime's Cranelift compiler backend may load additional data beyond the intended memory boundary when compiling the 'f64x2.splat' WebAssembly instruction. This out-of-bounds read can lead to a Denial of Service (DoS) through an uncaught segmentation fault if signals-based traps are disabled. While it could also load out-of-sandbox data if guard pages are disabled, this information is not accessible to WebAssembly guests.
CWE
CWE-466Affected Products
Red Hat Connectivity Link 1Red Hat Enterprise Linux 10