Files
advisory-db/crates/array-queue/RUSTSEC-2020-0047.md
2021-01-04 09:02:59 -08:00

20 lines
570 B
Markdown

```toml
[advisory]
id = "RUSTSEC-2020-0047"
package = "array-queue"
aliases = ["CVE-2020-35900"]
date = "2020-09-26"
keywords = ["memory-corruption", "uninitialized-memory", "use-after-free"]
url = "https://github.com/raviqqe/array-queue/issues/2"
[versions]
patched = []
unaffected = ["< 0.3.0"]
```
# array_queue pop_back() may cause a use-after-free
array_queue implements a circular queue that wraps around an array. However, it
fails to properly index into the array in the `pop_back` function allowing the
reading of previously dropped or uninitialized memory.