
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-6888-wf7j-34jq) affects the crossbeam-queue Rust crate, specifically versions prior to 0.2.3. The issue involves the SegQueue implementation which unsafely creates zero values of any type using mem::zeroed(). This vulnerability was discovered and disclosed in June 2022, affecting the core functionality of the queue implementation (GitHub Advisory, RustSec Advisory).
The vulnerability stems from the use of mem::zeroed() to create values of a user-supplied type T, which is fundamentally unsound when T is a reference type that must be non-null. The issue was classified as having moderate severity. The technical implementation violated Rust's memory safety guarantees, particularly when dealing with reference types that have specific initialization requirements (GitHub Advisory).
The vulnerability could lead to undefined behavior when the queue is used with reference types or other types that have specific initialization requirements. This unsoundness could potentially cause memory safety violations in applications using the affected versions of the crossbeam-queue crate (RustSec Advisory).
The vulnerability was fixed in version 0.2.3 of crossbeam-queue by replacing the usage of mem::zeroed() with MaybeUninit, which provides a safe way to handle uninitialized memory. Users should upgrade to version 0.2.3 or later to resolve this issue (GitHub PR, RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."