Description
Lucet is a native WebAssembly compiler and runtime. There is a bug in the main branch of `lucet-runtime` affecting all versions published to crates.io that allows a use-after-free in an Instance object that could result in memory corruption, data race, or other related issues. This bug was introduced early in the development of Lucet and is present in all releases. As a result of this bug, and dependent on the memory backing for the Instance objects, it is possible to trigger a use-after-free when the Instance is dropped. Users should upgrade to the main branch of the Lucet repository. Lucet no longer provides versioned releases on crates.io. There is no way to remediate this vulnerability without upgrading.
References (3)
Core 3
Core References
Exploit, Third Party Advisory x_refsource_confirm
https://github.com/bytecodealliance/lucet/security/advisories/GHSA-hf79-8hjp-rrvq
Patch, Third Party Advisory x_refsource_misc
https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8
Product, Third Party Advisory x_refsource_misc
https://crates.io/crates/lucet-runtime
Scores
CVSS v3
8.5
EPSS
0.0050
EPSS Percentile
66.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-416
Status
published
Products (2)
bytecodealliance/lucet
< 0.6.1
crates.io/lucet-runtime
0crates.io
Published
Nov 30, 2021
Tracked Since
Feb 18, 2026