{"id":"RUSTSEC-2020-0047","summary":"array_queue pop_back() may cause a use-after-free","details":"array_queue implements a circular queue that wraps around an array. However, it\nfails to properly index into the array in the `pop_back` function allowing the\nreading of previously dropped or uninitialized memory.","aliases":["CVE-2020-35900","GHSA-75cq-g75g-rxff"],"modified":"2023-11-08T04:03:38.302446Z","published":"2020-09-26T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/array-queue"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2020-0047.html"},{"type":"REPORT","url":"https://github.com/raviqqe/array-queue/issues/2"}],"affected":[{"package":{"name":"array-queue","ecosystem":"crates.io","purl":"pkg:cargo/array-queue"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.3.0"}]}],"ecosystem_specific":{"affects":{"functions":[],"os":[],"arch":[]},"affected_functions":null},"database_specific":{"informational":null,"source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2020-0047.json","cvss":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","categories":[]}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}