- Reported
- 
        
      
- Issued
- 
        
        
        
        
      
- Package
- 
        
        
        array-queue
          (crates.io)
        
        
      
- Type
- 
        
        Vulnerability
        
      
- Keywords
- 
        
          #memory-corruption
        
          #uninitialized-memory
        
          #use-after-free
        
      
- Aliases
- 
        
      
- References
- 
        
      
- CVSS Score
- 5.5 
        MEDIUM
      
- CVSS Details
- 
        
          
            - Attack Vector
- Local
- Attack Complexity
- Low
- Privileges Required
- Low
- User Interaction
- None
- Scope
- Unchanged
- Confidentiality Impact
- High
- Integrity Impact
- None
- Availability Impact
- None
 
- CVSS Vector
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Patched
- 
        
        no patched versions
        
      
- Unaffected
- 
        
      
Description
    array_queue implements a circular queue that wraps around an array. However, it
fails to properly index into the array in the pop_back function allowing the
reading of previously dropped or uninitialized memory.
    Advisory available under CC0-1.0
    license.