Wasmtime has host panic when Winch compiler executes `table.fill`
Moderate severity
GitHub Reviewed
Published
Apr 9, 2026
in
bytecodealliance/wasmtime
•
Updated Apr 10, 2026
Package
Affected versions
>= 25.0.0, < 36.0.7
>= 37.0.0, < 42.0.2
= 43.0.0
Patched versions
36.0.7
42.0.2
43.0.1
Description
Published by the National Vulnerability Database
Apr 9, 2026
Published to the GitHub Advisory Database
Apr 9, 2026
Reviewed
Apr 9, 2026
Last updated
Apr 10, 2026
Impact
Wasmtime's Winch compiler contains a vulnerability where the compilation of the
table.fillinstruction can result in a host panic. This means that a valid guest can be compiled with Winch, on any architecture, and cause the host to panic. This represents a denial-of-service vulnerability in Wasmtime due to guests being able to trigger a panic.The specific issue is that a historical refactoring, #11254, changed how compiled code referenced tables within the
table.*instructions. This refactoring forgot to update the Winch code paths associated as well, meaning that Winch was using the wrong indexing scheme. Due to the feature support of Winch the only problem that can result is tables being mixed up or nonexistent tables being used, meaning that the guest is limited to panicking the host (using a nonexistent table), or executing spec-incorrect behavior and modifying the wrong table.Patches
Wasmtime 36.0.7, 42.0.2, and 43.0.1 have been issued to fix this bug. Users are recommended to update to these patched versions of Wasmtime.
Workarounds
Users of Cranelift are not affected by this issue, but for users of Winch there is no workaround for this bug. Hosts are recommended to updated to a patched version of Wasmtime.
References