{"api_version":"1","generated_at":"2026-05-06T03:18:14+00:00","cve":"CVE-2021-43790","urls":{"html":"https://cve.report/CVE-2021-43790","api":"https://cve.report/api/cve/CVE-2021-43790.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-43790","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-43790"},"summary":{"title":"CVE-2021-43790","description":"Lucet is a native WebAssembly compiler and runtime. There is a bug in the main branch of `lucet-runtime` affecting all versions published to crates.io that allows a use-after-free in an Instance object that could result in memory corruption, data race, or other related issues. This bug was introduced early in the development of Lucet and is present in all releases. As a result of this bug, and dependent on the memory backing for the Instance objects, it is possible to trigger a use-after-free when the Instance is dropped. Users should upgrade to the main branch of the Lucet repository. Lucet no longer provides versioned releases on crates.io. There is no way to remediate this vulnerability without upgrading.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2021-11-30 00:15:00","updated_at":"2021-12-01 14:48:00"},"problem_types":["CWE-416"],"metrics":[],"references":[{"url":"https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8","name":"https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8","refsource":"MISC","tags":[],"title":"Merge pull request from GHSA-hf79-8hjp-rrvq · bytecodealliance/lucet@7c7757c · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://crates.io/crates/lucet-runtime","name":"https://crates.io/crates/lucet-runtime","refsource":"MISC","tags":[],"title":"","mime":"application/json","httpstatus":"404","archivestatus":"404"},{"url":"https://github.com/bytecodealliance/lucet/security/advisories/GHSA-hf79-8hjp-rrvq","name":"https://github.com/bytecodealliance/lucet/security/advisories/GHSA-hf79-8hjp-rrvq","refsource":"CONFIRM","tags":[],"title":"Use After Free in lucet-runtime · Advisory · bytecodealliance/lucet · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-43790","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43790","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"43790","vulnerable":"1","versionEndIncluding":"0.6.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"bytecodealliance","cpe5":"lucet","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"rust","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-43790","STATE":"PUBLIC","TITLE":"Use After Free in lucet"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"lucet","version":{"version_data":[{"version_value":"<= 0.6.1"}]}}]},"vendor_name":"bytecodealliance"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Lucet is a native WebAssembly compiler and runtime. There is a bug in the main branch of `lucet-runtime` affecting all versions published to crates.io that allows a use-after-free in an Instance object that could result in memory corruption, data race, or other related issues. This bug was introduced early in the development of Lucet and is present in all releases. As a result of this bug, and dependent on the memory backing for the Instance objects, it is possible to trigger a use-after-free when the Instance is dropped. Users should upgrade to the main branch of the Lucet repository. Lucet no longer provides versioned releases on crates.io. There is no way to remediate this vulnerability without upgrading."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-416: Use After Free"}]}]},"references":{"reference_data":[{"name":"https://github.com/bytecodealliance/lucet/security/advisories/GHSA-hf79-8hjp-rrvq","refsource":"CONFIRM","url":"https://github.com/bytecodealliance/lucet/security/advisories/GHSA-hf79-8hjp-rrvq"},{"name":"https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8","refsource":"MISC","url":"https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8"},{"name":"https://crates.io/crates/lucet-runtime","refsource":"MISC","url":"https://crates.io/crates/lucet-runtime"}]},"source":{"advisory":"GHSA-hf79-8hjp-rrvq","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-11-30 00:15:00","lastModifiedDate":"2021-12-01 14:48:00","problem_types":["CWE-416"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:bytecodealliance:lucet:*:*:*:*:*:rust:*:*","versionEndIncluding":"0.6.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"43790","Ordinal":"221308","Title":"CVE-2021-43790","CVE":"CVE-2021-43790","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"43790","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}