RUSTSEC-2020-0047 on 2020-09-26: array_queue pop_back() may cause a use-after-free

array_queue implements a circular queue that wraps around an array. However, it fails to properly index into the array in the pop_back function allowing the reading of previously dropped or uninitialized memory.

CVE-2020-35900

GHSA-75cq-g75g-rxff

This crate has no reviews yet. To add a review, set up your cargo-crev.


Crates in the crates.io registry are tarball snapshots uploaded by crates' publishers. The registry is not using crates' git repositories. There is absolutely no guarantee that the repository URL declared by the crate belongs to the crate, or that the code in the repository is the code inside the published tarball.

To review the actual code of the crate, it's best to use cargo crev open array-queue. Alternatively, you can download the tarball of array-queue v0.3.3 or view the source online.