Vulnerability DatabaseGHSA-xqjr-wfx3-gmxv

GHSA-xqjr-wfx3-gmxv
Rust vulnerability analysis and mitigation

Overview

The vulnerability (GHSA-xqjr-wfx3-gmxv) affects the array-queue Rust crate versions 0.3.0 through 0.3.3, discovered and disclosed in September 2025. The issue resides in the ArrayQueue::push_front method, which exhibits a panic-safety vulnerability that could lead to memory corruption. This moderate severity vulnerability (CVSS score 6.9) affects the safe API implementation of the array queue data structure (GitHub Advisory, RustSec Advisory).

Technical details

The vulnerability stems from a design flaw in the ArrayQueue::push_front implementation where the queue's start index is updated before initializing the slot for the newly pushed element. The method receives an argument that implements the Clone trait, which is intended to be cloned and pushed into the queue. If the clone operation panics during initialization, the structure remains in an inconsistent state with an advanced start index pointing to an uninitialized slot. This vulnerability is classified under CWE-665 (Improper Initialization) and has been assigned a CVSS v4.0 score of 6.9 with vector AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N (GitHub Advisory).

Impact

When the ArrayQueue object is dropped following a panic in the clone operation, its destructor incorrectly treats the uninitialized slot as initialized and attempts to drop it. This leads to an attempt to deallocate uninitialized memory, potentially causing memory corruption and program crashes (GitHub Issue).

Mitigation and workarounds

The vulnerability has been fixed in version 0.4.0 of the array-queue crate. The fix modifies the ArrayQueue::push_front implementation to ensure that the queue's start index is updated after the cloned element is successfully pushed, maintaining proper initialization order. Users are strongly recommended to upgrade to version 0.4.0 or later (RustSec Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management