Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-34943 (GCVE-0-2026-34943)
Vulnerability from cvelistv5 – Published: 2026-04-09 18:36 – Updated: 2026-04-13 20:15- CWE-248 - Uncaught Exception
| URL | Tags |
|---|---|
| https://github.com/bytecodealliance/wasmtime/secu… | x_refsource_CONFIRM |
| Vendor | Product | Version | |
|---|---|---|---|
| bytecodealliance | wasmtime |
Affected:
< 24.0.7
Affected: >= 25.0.0, < 36.0.7 Affected: >= 37.0.0, < 42.0.2 Affected: >= 43.0.0, < 44.0.1 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-34943",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-13T20:15:13.926993Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-13T20:15:23.994Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "wasmtime",
"vendor": "bytecodealliance",
"versions": [
{
"status": "affected",
"version": "\u003c 24.0.7"
},
{
"status": "affected",
"version": "\u003e= 25.0.0, \u003c 36.0.7"
},
{
"status": "affected",
"version": "\u003e= 37.0.0, \u003c 42.0.2"
},
{
"status": "affected",
"version": "\u003e= 43.0.0, \u003c 44.0.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contains a possible panic which can happen when a flags-typed component model value is lifted with the Val type. If bits are set outside of the set of flags the component model specifies that these bits should be ignored but Wasmtime will panic when this value is lifted. This panic only affects wasmtime\u0027s implementation of lifting into Val, not when using the flags! macro. This additionally only affects flags-typed values which are part of a WIT interface. This has the risk of being a guest-controlled panic within the host which Wasmtime considers a DoS vector. This vulnerability is fixed in 24.0.7, 36.0.7, 42.0.2, and 43.0.1."
}
],
"metrics": [
{
"cvssV4_0": {
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "ACTIVE",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-248",
"description": "CWE-248: Uncaught Exception",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-09T18:36:51.370Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-m758-wjhj-p3jq",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-m758-wjhj-p3jq"
}
],
"source": {
"advisory": "GHSA-m758-wjhj-p3jq",
"discovery": "UNKNOWN"
},
"title": "Wasmtime panics when lifting `flags` component value"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-34943",
"datePublished": "2026-04-09T18:36:51.370Z",
"dateReserved": "2026-03-31T17:27:08.660Z",
"dateUpdated": "2026-04-13T20:15:23.994Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-34943",
"date": "2026-05-21",
"epss": "0.00018",
"percentile": "0.0479"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-34943\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-04-09T19:16:24.020\",\"lastModified\":\"2026-04-20T18:28:03.000\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contains a possible panic which can happen when a flags-typed component model value is lifted with the Val type. If bits are set outside of the set of flags the component model specifies that these bits should be ignored but Wasmtime will panic when this value is lifted. This panic only affects wasmtime\u0027s implementation of lifting into Val, not when using the flags! macro. This additionally only affects flags-typed values which are part of a WIT interface. This has the risk of being a guest-controlled panic within the host which Wasmtime considers a DoS vector. This vulnerability is fixed in 24.0.7, 36.0.7, 42.0.2, and 43.0.1.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":5.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"ACTIVE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-248\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*\",\"versionEndExcluding\":\"24.0.7\",\"matchCriteriaId\":\"5A39DBFB-CD5E-4551-8885-053DF90E277A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*\",\"versionStartIncluding\":\"25.0.0\",\"versionEndExcluding\":\"36.0.7\",\"matchCriteriaId\":\"B5AB2157-3977-49F9-9058-6B16A2556170\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*\",\"versionStartIncluding\":\"37.0.0\",\"versionEndExcluding\":\"42.0.2\",\"matchCriteriaId\":\"1D7B70EB-93E3-4732-AB70-E6A531178941\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*\",\"versionStartIncluding\":\"43.0.0\",\"versionEndExcluding\":\"43.0.1\",\"matchCriteriaId\":\"15FD6AA4-973B-4647-9222-40FBDC16A6FD\"}]}]}],\"references\":[{\"url\":\"https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-m758-wjhj-p3jq\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-34943\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-13T20:15:13.926993Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-13T20:15:19.863Z\"}}], \"cna\": {\"title\": \"Wasmtime panics when lifting `flags` component value\", \"source\": {\"advisory\": \"GHSA-m758-wjhj-p3jq\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 5.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N\", \"userInteraction\": \"ACTIVE\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"HIGH\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"bytecodealliance\", \"product\": \"wasmtime\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 24.0.7\"}, {\"status\": \"affected\", \"version\": \"\u003e= 25.0.0, \u003c 36.0.7\"}, {\"status\": \"affected\", \"version\": \"\u003e= 37.0.0, \u003c 42.0.2\"}, {\"status\": \"affected\", \"version\": \"\u003e= 43.0.0, \u003c 44.0.1\"}]}], \"references\": [{\"url\": \"https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-m758-wjhj-p3jq\", \"name\": \"https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-m758-wjhj-p3jq\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contains a possible panic which can happen when a flags-typed component model value is lifted with the Val type. If bits are set outside of the set of flags the component model specifies that these bits should be ignored but Wasmtime will panic when this value is lifted. This panic only affects wasmtime\u0027s implementation of lifting into Val, not when using the flags! macro. This additionally only affects flags-typed values which are part of a WIT interface. This has the risk of being a guest-controlled panic within the host which Wasmtime considers a DoS vector. This vulnerability is fixed in 24.0.7, 36.0.7, 42.0.2, and 43.0.1.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-248\", \"description\": \"CWE-248: Uncaught Exception\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2026-04-09T18:36:51.370Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-34943\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-13T20:15:23.994Z\", \"dateReserved\": \"2026-03-31T17:27:08.660Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2026-04-09T18:36:51.370Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-34943
Vulnerability from fkie_nvd - Published: 2026-04-09 19:16 - Updated: 2026-04-20 18:28| Vendor | Product | Version | |
|---|---|---|---|
| bytecodealliance | wasmtime | * | |
| bytecodealliance | wasmtime | * | |
| bytecodealliance | wasmtime | * | |
| bytecodealliance | wasmtime | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*",
"matchCriteriaId": "5A39DBFB-CD5E-4551-8885-053DF90E277A",
"versionEndExcluding": "24.0.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*",
"matchCriteriaId": "B5AB2157-3977-49F9-9058-6B16A2556170",
"versionEndExcluding": "36.0.7",
"versionStartIncluding": "25.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*",
"matchCriteriaId": "1D7B70EB-93E3-4732-AB70-E6A531178941",
"versionEndExcluding": "42.0.2",
"versionStartIncluding": "37.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*",
"matchCriteriaId": "15FD6AA4-973B-4647-9222-40FBDC16A6FD",
"versionEndExcluding": "43.0.1",
"versionStartIncluding": "43.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contains a possible panic which can happen when a flags-typed component model value is lifted with the Val type. If bits are set outside of the set of flags the component model specifies that these bits should be ignored but Wasmtime will panic when this value is lifted. This panic only affects wasmtime\u0027s implementation of lifting into Val, not when using the flags! macro. This additionally only affects flags-typed values which are part of a WIT interface. This has the risk of being a guest-controlled panic within the host which Wasmtime considers a DoS vector. This vulnerability is fixed in 24.0.7, 36.0.7, 42.0.2, and 43.0.1."
}
],
"id": "CVE-2026-34943",
"lastModified": "2026-04-20T18:28:03.000",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "ACTIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-04-09T19:16:24.020",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-m758-wjhj-p3jq"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-248"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
GHSA-M758-WJHJ-P3JQ
Vulnerability from github – Published: 2026-04-09 20:22 – Updated: 2026-04-24 21:03Impact
Wasmtime contains a possible panic which can happen when a flags-typed component model value is lifted with the Val type. If bits are set outside of the set of flags the component model specifies that these bits should be ignored but Wasmtime will panic when this value is lifted. This panic only affects wasmtime's implementation of lifting into Val, not when using the flags! macro. This additionally only affects flags-typed values which are part of a WIT interface.
This has the risk of being a guest-controlled panic within the host which Wasmtime considers a DoS vector.
Patches
Wasmtime 24.0.7, 36.0.7, 42.0.2, and 43.0.1 have been issued to fix this bug. Users are recommended to update to these patched versions of Wasmtime.
Workarounds
There is no workaround for this bug if a host meets the criteria to be affected. To be affected a host must be using wasmtime::component::Val and possibly work with a flags type in the component model.
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "wasmtime"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "24.0.7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "crates.io",
"name": "wasmtime"
},
"ranges": [
{
"events": [
{
"introduced": "25.0.0"
},
{
"fixed": "36.0.7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "crates.io",
"name": "wasmtime"
},
"ranges": [
{
"events": [
{
"introduced": "37.0.0"
},
{
"fixed": "42.0.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "crates.io",
"name": "wasmtime"
},
"ranges": [
{
"events": [
{
"introduced": "43.0.0"
},
{
"fixed": "43.0.1"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"43.0.0"
]
}
],
"aliases": [
"CVE-2026-34943"
],
"database_specific": {
"cwe_ids": [
"CWE-248"
],
"github_reviewed": true,
"github_reviewed_at": "2026-04-09T20:22:34Z",
"nvd_published_at": "2026-04-09T19:16:24Z",
"severity": "MODERATE"
},
"details": "### Impact\n\nWasmtime contains a possible panic which can happen when a `flags`-typed component model value is lifted with the `Val` type. If bits are set outside of the set of flags the component model specifies that these bits should be ignored but Wasmtime will panic when this value is lifted. This panic only affects wasmtime\u0027s implementation of lifting into `Val`, not when using the `flags!` macro. This additionally only affects `flags`-typed values which are part of a WIT interface. \n\nThis has the risk of being a guest-controlled panic within the host which Wasmtime considers a DoS vector.\n\n### Patches\n\nWasmtime 24.0.7, 36.0.7, 42.0.2, and 43.0.1 have been issued to fix this bug. Users are recommended to update to these patched versions of Wasmtime.\n\n### Workarounds\n\nThere is no workaround for this bug if a host meets the criteria to be affected. To be affected a host must be using `wasmtime::component::Val` and possibly work with a `flags` type in the component model.",
"id": "GHSA-m758-wjhj-p3jq",
"modified": "2026-04-24T21:03:43Z",
"published": "2026-04-09T20:22:34Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-m758-wjhj-p3jq"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34943"
},
{
"type": "PACKAGE",
"url": "https://github.com/bytecodealliance/wasmtime"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0085.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Wasmtime has a possible panic when lifting `flags` component value"
}
OPENSUSE-SU-2026:10715-1
Vulnerability from csaf_opensuse - Published: 2026-05-06 00:00 - Updated: 2026-05-06 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libtree-sitter0_26-0.26.8-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libtree-sitter0_26-0.26.8-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10715",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10715-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34941 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34943 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34943/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34988 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34988/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-35186 page",
"url": "https://www.suse.com/security/cve/CVE-2026-35186/"
}
],
"title": "libtree-sitter0_26-0.26.8-2.1 on GA media",
"tracking": {
"current_release_date": "2026-05-06T00:00:00Z",
"generator": {
"date": "2026-05-06T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10715-1",
"initial_release_date": "2026-05-06T00:00:00Z",
"revision_history": [
{
"date": "2026-05-06T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libtree-sitter0_26-0.26.8-2.1.aarch64",
"product": {
"name": "libtree-sitter0_26-0.26.8-2.1.aarch64",
"product_id": "libtree-sitter0_26-0.26.8-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64",
"product": {
"name": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64",
"product_id": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "tree-sitter-0.26.8-2.1.aarch64",
"product": {
"name": "tree-sitter-0.26.8-2.1.aarch64",
"product_id": "tree-sitter-0.26.8-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "tree-sitter-devel-0.26.8-2.1.aarch64",
"product": {
"name": "tree-sitter-devel-0.26.8-2.1.aarch64",
"product_id": "tree-sitter-devel-0.26.8-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtree-sitter0_26-0.26.8-2.1.ppc64le",
"product": {
"name": "libtree-sitter0_26-0.26.8-2.1.ppc64le",
"product_id": "libtree-sitter0_26-0.26.8-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le",
"product": {
"name": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le",
"product_id": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "tree-sitter-0.26.8-2.1.ppc64le",
"product": {
"name": "tree-sitter-0.26.8-2.1.ppc64le",
"product_id": "tree-sitter-0.26.8-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "tree-sitter-devel-0.26.8-2.1.ppc64le",
"product": {
"name": "tree-sitter-devel-0.26.8-2.1.ppc64le",
"product_id": "tree-sitter-devel-0.26.8-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libtree-sitter0_26-0.26.8-2.1.s390x",
"product": {
"name": "libtree-sitter0_26-0.26.8-2.1.s390x",
"product_id": "libtree-sitter0_26-0.26.8-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x",
"product": {
"name": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x",
"product_id": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x"
}
},
{
"category": "product_version",
"name": "tree-sitter-0.26.8-2.1.s390x",
"product": {
"name": "tree-sitter-0.26.8-2.1.s390x",
"product_id": "tree-sitter-0.26.8-2.1.s390x"
}
},
{
"category": "product_version",
"name": "tree-sitter-devel-0.26.8-2.1.s390x",
"product": {
"name": "tree-sitter-devel-0.26.8-2.1.s390x",
"product_id": "tree-sitter-devel-0.26.8-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libtree-sitter0_26-0.26.8-2.1.x86_64",
"product": {
"name": "libtree-sitter0_26-0.26.8-2.1.x86_64",
"product_id": "libtree-sitter0_26-0.26.8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64",
"product": {
"name": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64",
"product_id": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "tree-sitter-0.26.8-2.1.x86_64",
"product": {
"name": "tree-sitter-0.26.8-2.1.x86_64",
"product_id": "tree-sitter-0.26.8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "tree-sitter-devel-0.26.8-2.1.x86_64",
"product": {
"name": "tree-sitter-devel-0.26.8-2.1.x86_64",
"product_id": "tree-sitter-devel-0.26.8-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtree-sitter0_26-0.26.8-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64"
},
"product_reference": "libtree-sitter0_26-0.26.8-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtree-sitter0_26-0.26.8-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le"
},
"product_reference": "libtree-sitter0_26-0.26.8-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtree-sitter0_26-0.26.8-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x"
},
"product_reference": "libtree-sitter0_26-0.26.8-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtree-sitter0_26-0.26.8-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64"
},
"product_reference": "libtree-sitter0_26-0.26.8-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64"
},
"product_reference": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le"
},
"product_reference": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x"
},
"product_reference": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64"
},
"product_reference": "libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tree-sitter-0.26.8-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64"
},
"product_reference": "tree-sitter-0.26.8-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tree-sitter-0.26.8-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le"
},
"product_reference": "tree-sitter-0.26.8-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tree-sitter-0.26.8-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x"
},
"product_reference": "tree-sitter-0.26.8-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tree-sitter-0.26.8-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64"
},
"product_reference": "tree-sitter-0.26.8-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tree-sitter-devel-0.26.8-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64"
},
"product_reference": "tree-sitter-devel-0.26.8-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tree-sitter-devel-0.26.8-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le"
},
"product_reference": "tree-sitter-devel-0.26.8-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tree-sitter-devel-0.26.8-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x"
},
"product_reference": "tree-sitter-devel-0.26.8-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tree-sitter-devel-0.26.8-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64"
},
"product_reference": "tree-sitter-devel-0.26.8-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-34941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34941"
}
],
"notes": [
{
"category": "general",
"text": "Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contains a vulnerability where when transcoding a UTF-16 string to the latin1+utf16 component-model encoding it would incorrectly validate the byte length of the input string when performing a bounds check. Specifically the number of code units were checked instead of the byte length, which is twice the size of the code units. This vulnerability can cause the host to read beyond the end of a WebAssembly\u0027s linear memory in an attempt to transcode nonexistent bytes. In Wasmtime\u0027s default configuration this will read unmapped memory on a guard page, terminating the process with a segfault. Wasmtime can be configured, however, without guard pages which would mean that host memory beyond the end of linear memory may be read and interpreted as UTF-16. A host segfault is a denial-of-service vulnerability in Wasmtime, and possibly being able to read beyond the end of linear memory is additionally a vulnerability. Note that reading beyond the end of linear memory requires nonstandard configuration of Wasmtime, specifically with guard pages disabled. This vulnerability is fixed in 24.0.7, 36.0.7, 42.0.2, and 43.0.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34941",
"url": "https://www.suse.com/security/cve/CVE-2026-34941"
},
{
"category": "external",
"summary": "SUSE Bug 1261869 for CVE-2026-34941",
"url": "https://bugzilla.suse.com/1261869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-06T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34941"
},
{
"cve": "CVE-2026-34943",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34943"
}
],
"notes": [
{
"category": "general",
"text": "Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contains a possible panic which can happen when a flags-typed component model value is lifted with the Val type. If bits are set outside of the set of flags the component model specifies that these bits should be ignored but Wasmtime will panic when this value is lifted. This panic only affects wasmtime\u0027s implementation of lifting into Val, not when using the flags! macro. This additionally only affects flags-typed values which are part of a WIT interface. This has the risk of being a guest-controlled panic within the host which Wasmtime considers a DoS vector. This vulnerability is fixed in 24.0.7, 36.0.7, 42.0.2, and 43.0.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34943",
"url": "https://www.suse.com/security/cve/CVE-2026-34943"
},
{
"category": "external",
"summary": "SUSE Bug 1261951 for CVE-2026-34943",
"url": "https://bugzilla.suse.com/1261951"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-06T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34943"
},
{
"cve": "CVE-2026-34988",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34988"
}
],
"notes": [
{
"category": "general",
"text": "Wasmtime is a runtime for WebAssembly. From 28.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime\u0027s implementation of its pooling allocator contains a bug where in certain configurations the contents of linear memory can be leaked from one instance to the next. The implementation of resetting the virtual memory permissions for linear memory used the wrong predicate to determine if resetting was necessary, where the compilation process used a different predicate. This divergence meant that the pooling allocator incorrectly deduced at runtime that resetting virtual memory permissions was not necessary while compile-time determine that virtual memory could be relied upon. The pooling allocator must be in use, Config::memory_guard_size configuration option must be 0, Config::memory_reservation configuration must be less than 4GiB, and pooling allocator must be configured with max_memory_size the same as the memory_reservation value in order to exploit this vulnerability. If all of these conditions are applicable then when a linear memory is reused the VM permissions of the previous iteration are not reset. This means that the compiled code, which is assuming out-of-bounds loads will segfault, will not actually segfault and can read the previous contents of linear memory if it was previously mapped. This represents a data leakage vulnerability between guest WebAssembly instances which breaks WebAssembly\u0027s semantics and additionally breaks the sandbox that Wasmtime provides. Wasmtime is not vulnerable to this issue with its default settings, nor with the default settings of the pooling allocator, but embeddings are still allowed to configure these values to cause this vulnerability. This vulnerability is fixed in 36.0.7, 42.0.2, and 43.0.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34988",
"url": "https://www.suse.com/security/cve/CVE-2026-34988"
},
{
"category": "external",
"summary": "SUSE Bug 1261966 for CVE-2026-34988",
"url": "https://bugzilla.suse.com/1261966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-06T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34988"
},
{
"cve": "CVE-2026-35186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-35186"
}
],
"notes": [
{
"category": "general",
"text": "Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime\u0027s Winch compiler backend contains a bug where translating the table.grow operator causes the result to be incorrectly typed. For 32-bit tables this means that the result of the operator, internally in Winch, is tagged as a 64-bit value instead of a 32-bit value. This invalid internal representation of Winch\u0027s compiler state compounds into further issues depending on how the value is consumed. The primary consequence of this bug is that bytes in the host\u0027s address space can be stored/read from. This is only applicable to the 16 bytes before linear memory, however, as the only significant return value of table.grow that can be misinterpreted is -1. The bytes before linear memory are, by default, unmapped memory. Wasmtime will detect this fault and abort the process, however, because wasm should not be able to access these bytes. Overall this this bug in Winch represents a DoS vector by crashing the host process, a correctness issue within Winch, and a possible leak of up to 16-bytes before linear memory. Wasmtime\u0027s default compiler is Cranelift, not Winch, and Wasmtime\u0027s default settings are to place guard pages before linear memory. This means that Wasmtime\u0027s default configuration is not affected by this issue, and when explicitly choosing Winch Wasmtime\u0027s otherwise default configuration leads to a DoS. Disabling guard pages before linear memory is required to possibly leak up to 16-bytes of host data. This vulnerability is fixed in 36.0.7, 42.0.2, and 43.0.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-35186",
"url": "https://www.suse.com/security/cve/CVE-2026-35186"
},
{
"category": "external",
"summary": "SUSE Bug 1262034 for CVE-2026-35186",
"url": "https://bugzilla.suse.com/1262034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:libtree-sitter0_26-x86-64-v3-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-0.26.8-2.1.x86_64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.aarch64",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.ppc64le",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.s390x",
"openSUSE Tumbleweed:tree-sitter-devel-0.26.8-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-06T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-35186"
}
]
}
rustsec-2026-0085
Vulnerability from osv_rustsec
This is an entry in the RustSec database for the Wasmtime security advisory located at https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-m758-wjhj-p3jq For more information see the GitHub-hosted security advisory.
| URL | Type | |
|---|---|---|
{
"affected": [
{
"database_specific": {
"categories": [],
"cvss": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"informational": null
},
"ecosystem_specific": {
"affected_functions": null,
"affects": {
"arch": [],
"functions": [],
"os": []
}
},
"package": {
"ecosystem": "crates.io",
"name": "wasmtime",
"purl": "pkg:cargo/wasmtime"
},
"ranges": [
{
"events": [
{
"introduced": "0.0.0-0"
},
{
"fixed": "24.0.7"
},
{
"introduced": "25.0.0"
},
{
"fixed": "36.0.7"
},
{
"introduced": "37.0.0"
},
{
"fixed": "42.0.2"
},
{
"introduced": "43.0.0"
},
{
"fixed": "43.0.1"
}
],
"type": "SEMVER"
}
],
"versions": []
}
],
"aliases": [
"CVE-2026-34943",
"GHSA-m758-wjhj-p3jq"
],
"database_specific": {
"license": "CC0-1.0"
},
"details": "This is an entry in the RustSec database for the Wasmtime security advisory\nlocated at\nhttps://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-m758-wjhj-p3jq\nFor more information see the GitHub-hosted security advisory.",
"id": "RUSTSEC-2026-0085",
"modified": "2026-04-09T19:59:38Z",
"published": "2026-04-09T12:00:00Z",
"references": [
{
"type": "PACKAGE",
"url": "https://crates.io/crates/wasmtime"
},
{
"type": "ADVISORY",
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0085.html"
},
{
"type": "ADVISORY",
"url": "https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-m758-wjhj-p3jq"
}
],
"related": [],
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Panic when lifting `flags` component value"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.