Allocation of Resources Without Limits or Throttling Affecting rust-wasmtime package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN13-RUSTWASMTIME-15340903
  • published25 Feb 2026
  • disclosed24 Feb 2026

Introduced: 24 Feb 2026

CVE-2026-27572  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

There is no fixed version for Debian:13 rust-wasmtime.

NVD Description

Note: Versions mentioned in the description apply only to the upstream rust-wasmtime package and not the rust-wasmtime package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of the wasi:http/types.fields resource is susceptible to panics when too many fields are added to the set of headers. Wasmtime's implementation in the wasmtime-wasi-http crate is backed by a data structure which panics when it reaches excessive capacity and this condition was not handled gracefully in Wasmtime. Panicking in a WASI implementation is a Denial of Service vector for embedders and is treated as a security vulnerability in Wasmtime. Wasmtime 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0 patch this vulnerability and return a trap to the guest instead of panicking. There are no known workarounds at this time. Embedders are encouraged to update to a patched version of Wasmtime.

CVSS Base Scores

version 3.1