DEBIAN-CVE-2026-34943

Source
https://security-tracker.debian.org/tracker/CVE-2026-34943
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34943.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-34943
Upstream
  • CVE-2026-34943
Published
2026-04-09T19:16:24.020Z
Modified
2026-04-10T09:03:34.290433Z
Severity
  • 5.6 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contains a possible panic which can happen when a flags-typed component model value is lifted with the Val type. If bits are set outside of the set of flags the component model specifies that these bits should be ignored but Wasmtime will panic when this value is lifted. This panic only affects wasmtime's implementation of lifting into Val, not when using the flags! macro. This additionally only affects flags-typed values which are part of a WIT interface. This has the risk of being a guest-controlled panic within the host which Wasmtime considers a DoS vector. This vulnerability is fixed in 24.0.7, 36.0.7, 42.0.2, and 43.0.1.

References

Affected packages

Debian:13 / rust-wasmtime

Package

Name
rust-wasmtime
Purl
pkg:deb/debian/rust-wasmtime?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

26.*
26.0.1+dfsg-3
26.0.1+dfsg-4
26.0.1+dfsg-5
26.0.1+dfsg-6
26.0.1+dfsg-7
26.0.1+dfsg-8
26.0.1+dfsg-9
26.0.1+dfsg-10
27.*
27.0.0+dfsg-2
27.0.0+dfsg-3
27.0.0+dfsg-4
28.*
28.0.1+dfsg-1
28.0.1+dfsg-2
28.0.1+dfsg-3
29.*
29.0.1+dfsg-1
29.0.1+dfsg-2
29.0.1+dfsg-3
29.0.1+dfsg-4
29.0.1+dfsg-5
29.0.1+dfsg-6
29.0.1+dfsg-7
29.0.1+dfsg-8
36.*
36.0.5+dfsg-1
36.0.5+dfsg-2
36.0.5+dfsg-3
36.0.5+dfsg-4
36.0.5+dfsg-5
36.0.6+dfsg-1
36.0.6+dfsg-2
36.0.6+dfsg-3
36.0.6+dfsg-4
36.0.6+dfsg-5
36.0.6+dfsg-6

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34943.json"

Debian:14 / rust-wasmtime

Package

Name
rust-wasmtime
Purl
pkg:deb/debian/rust-wasmtime?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

26.*
26.0.1+dfsg-3
26.0.1+dfsg-4
26.0.1+dfsg-5
26.0.1+dfsg-6
26.0.1+dfsg-7
26.0.1+dfsg-8
26.0.1+dfsg-9
26.0.1+dfsg-10
27.*
27.0.0+dfsg-2
27.0.0+dfsg-3
27.0.0+dfsg-4
28.*
28.0.1+dfsg-1
28.0.1+dfsg-2
28.0.1+dfsg-3
29.*
29.0.1+dfsg-1
29.0.1+dfsg-2
29.0.1+dfsg-3
29.0.1+dfsg-4
29.0.1+dfsg-5
29.0.1+dfsg-6
29.0.1+dfsg-7
29.0.1+dfsg-8
36.*
36.0.5+dfsg-1
36.0.5+dfsg-2
36.0.5+dfsg-3
36.0.5+dfsg-4
36.0.5+dfsg-5
36.0.6+dfsg-1
36.0.6+dfsg-2
36.0.6+dfsg-3
36.0.6+dfsg-4
36.0.6+dfsg-5
36.0.6+dfsg-6

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34943.json"