WhisperX tag archive

#webassembly

This page collects WhisperX intelligence signals tagged #webassembly. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (3)

The Lab · 2026-04-10 12:22:58 · GitHub Issues

1. Polkadot-SDK Dependency Chain Exposes Critical Wasmtime CVE, Forced to Ignore in Security Scan

A critical vulnerability in the Wasmtime runtime (CVE GHSA-jhxm-h53p-jm7w) is forcing a major blockchain project to bypass its own security protocols. The vulnerability is a transitive dependency locked deep within the Polkadot-SDK codebase, specifically via the `sc-executor-wasmtime` crate. The dependency is pinned to...

The Lab · 2026-04-20 13:23:01 · GitHub Issues

2. Wasmtime Rust Crate Major Update to v43 Patches Critical Memory Safety Vulnerability CVE-2026-34941

A critical security vulnerability in the widely-used WebAssembly runtime, Wasmtime, has prompted a major version update to patch a memory safety flaw. The vulnerability, tracked as CVE-2026-34941, stems from an incorrect bounds check during string transcoding, which could allow a malicious WebAssembly module to trigger...

The Lab · 2026-05-10 12:01:45 · GitHub Issues

3. Wasmtime Rust Crate Patches Memory Safety Flaw in WebAssembly Shared Memory Access

A security-focused update to the Wasmtime WebAssembly runtime addresses a soundness vulnerability that could expose Rust embedders to data race conditions. The patch, which upgrades the crate from version 26.0 to 36.0, resolves CVE-2025-64345 (GHSA-hc7m-r6v8-hg9q)—an unsound API interaction involving shared linear memo...