From ee8f6684008994ce062f6acb53537946b045fa8c Mon Sep 17 00:00:00 2001 From: "Sergey \"Shnatsel\" Davidoff" Date: Sat, 26 Sep 2020 12:23:43 +0200 Subject: [PATCH] Update RUSTSEC-0000-0000.toml --- crates/array-queue/RUSTSEC-0000-0000.toml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/crates/array-queue/RUSTSEC-0000-0000.toml b/crates/array-queue/RUSTSEC-0000-0000.toml index 6b00f78..8afe76b 100644 --- a/crates/array-queue/RUSTSEC-0000-0000.toml +++ b/crates/array-queue/RUSTSEC-0000-0000.toml @@ -2,15 +2,17 @@ id = "RUSTSEC-0000-0000" package = "array-queue" date = "2020-09-26" -title = "array_queue pop_back allows an out-of-bounds read." +title = "array_queue pop_back() may cause a use-after-free" url = "https://github.com/raviqqe/array-queue/issues/2" description = """ array_queue implements a circular queue that wraps around an array. However, it fails to properly index into the array in the `pop_back` function allowing the reading of previously dropped or uninitialized memory. """ -keywords = ["memory-corruption", "uninitialized-memory"] - +keywords = ["memory-corruption", "uninitialized-memory", "use-after-free"] +functions = { "array_queue::ArrayQueue::push_back" = [">= 0.3.0"] } [versions] + patched = [] +unaffected = ["< 0.3.0"]