Bug 2442485 (CVE-2026-27572) - CVE-2026-27572 wasmtime: Wasmtime: Denial of Service via excessive HTTP header fields
Summary: CVE-2026-27572 wasmtime: Wasmtime: Denial of Service via excessive HTTP heade...
Keywords:
Status: NEW
Alias: CVE-2026-27572
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2442502 2442503
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-02-24 22:02 UTC by OSIDB Bzimport
Modified: 2026-02-24 23:14 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-02-24 22:02:12 UTC
Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of the `wasi:http/types.fields` resource is susceptible to panics when too many fields are added to the set of headers. Wasmtime's implementation in the `wasmtime-wasi-http` crate is backed by a data structure which panics when it reaches excessive capacity and this condition was not handled gracefully in Wasmtime. Panicking in a WASI implementation is a Denial of Service vector for embedders and is treated as a security vulnerability in Wasmtime. Wasmtime 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0 patch this vulnerability and return a trap to the guest instead of panicking. There are no known workarounds at this time. Embedders are encouraged to update to a patched version of Wasmtime.


Note You need to log in before you can comment on or make changes to this bug.