RUSTSEC-2020-0047
on 2020-09-26: array_queue pop_back() may cause a use-after-free
This crate has no reviews yet. To add a review, set up your cargo-crev
.
Crates in the crates.io registry are tarball snapshots uploaded by crates' publishers. The registry is not using crates' git repositories. There is absolutely no guarantee that the repository URL declared by the crate belongs to the crate, or that the code in the repository is the code inside the published tarball.
To review the actual code of the crate, it's best to use cargo crev open array-queue
. Alternatively, you can download the tarball of array-queue v0.3.3 or view the source online.
array_queue implements a circular queue that wraps around an array. However, it fails to properly index into the array in the
pop_back
function allowing the reading of previously dropped or uninitialized memory.CVE-2020-35900
GHSA-75cq-g75g-rxff