Vulnerability Details CVE-2021-43790
Lucet is a native WebAssembly compiler and runtime. There is a bug in the main branch of `lucet-runtime` affecting all versions published to crates.io that allows a use-after-free in an Instance object that could result in memory corruption, data race, or other related issues. This bug was introduced early in the development of Lucet and is present in all releases. As a result of this bug, and dependent on the memory backing for the Instance objects, it is possible to trigger a use-after-free when the Instance is dropped. Users should upgrade to the main branch of the Lucet repository. Lucet no longer provides versioned releases on crates.io. There is no way to remediate this vulnerability without upgrading.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 63.7%
CVSS Severity
CVSS v3 Score 8.5
CVSS v2 Score 6.8
Products affected by CVE-2021-43790
-
cpe:2.3:a:bytecodealliance:lucet:0.1.1
-
cpe:2.3:a:bytecodealliance:lucet:0.1.2
-
cpe:2.3:a:bytecodealliance:lucet:0.2.0
-
cpe:2.3:a:bytecodealliance:lucet:0.2.1
-
cpe:2.3:a:bytecodealliance:lucet:0.2.2
-
cpe:2.3:a:bytecodealliance:lucet:0.3.0
-
cpe:2.3:a:bytecodealliance:lucet:0.3.1
-
cpe:2.3:a:bytecodealliance:lucet:0.4.1
-
cpe:2.3:a:bytecodealliance:lucet:0.4.3
-
cpe:2.3:a:bytecodealliance:lucet:0.5.0
-
cpe:2.3:a:bytecodealliance:lucet:0.5.1
-
cpe:2.3:a:bytecodealliance:lucet:0.6.0
-
cpe:2.3:a:bytecodealliance:lucet:0.6.1