DEBIAN-CVE-2025-6274

Source
https://security-tracker.debian.org/tracker/CVE-2025-6274
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-6274.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-6274
Upstream
Published
2025-06-19T19:15:22.710Z
Modified
2025-11-20T10:18:27.174428Z
Severity
  • 1.9 (Low) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

A vulnerability was found in WebAssembly wabt up to 1.0.37. It has been classified as problematic. Affected is the function OnDataCount of the file src/interp/binary-reader-interp.cc. The manipulation leads to resource consumption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. A similar issue reported during the same timeframe was disputed by the code maintainer because it might not affect "real world wasm programs". Therefore, this entry might get disputed as well in the future.

References

Affected packages

Debian:11 / wabt

Package

Name
wabt
Purl
pkg:deb/debian/wabt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.20-1
1.0.21-1
1.0.24-1
1.0.24-2
1.0.25-1
1.0.26-1
1.0.27-1
1.0.28-1
1.0.29-1
1.0.30-1
1.0.31-1
1.0.32-1
1.0.33-1
1.0.34-1
1.0.34+dsfg2+~cs1.0.32-1
1.0.34+dsfg2+~cs1.0.32-2
1.0.34+dsfg2+~cs1.0.32-3
1.0.34+dsfg2+~cs1.0.32-4
1.0.34+dsfg+~cs1.0.32-1
1.0.36+dfsg+~cs1.0.36-1
1.0.36+dfsg+~cs1.0.36-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-6274.json"

Debian:12 / wabt

Package

Name
wabt
Purl
pkg:deb/debian/wabt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.32-1
1.0.33-1
1.0.34-1
1.0.34+dsfg2+~cs1.0.32-1
1.0.34+dsfg2+~cs1.0.32-2
1.0.34+dsfg2+~cs1.0.32-3
1.0.34+dsfg2+~cs1.0.32-4
1.0.34+dsfg+~cs1.0.32-1
1.0.36+dfsg+~cs1.0.36-1
1.0.36+dfsg+~cs1.0.36-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-6274.json"

Debian:13 / wabt

Package

Name
wabt
Purl
pkg:deb/debian/wabt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.36+dfsg+~cs1.0.36-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-6274.json"

Debian:14 / wabt

Package

Name
wabt
Purl
pkg:deb/debian/wabt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.36+dfsg+~cs1.0.36-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-6274.json"