
Cloud Vulnerability DB
A community-led vulnerabilities database
RUSTSEC-2022-0021 affects the crossbeam-queue crate, specifically versions prior to 0.3.5. The vulnerability was identified in the Rust package ecosystem and has been fixed in subsequent releases (Debian Tracker).
The vulnerability involves unsound code related to memory handling, specifically the improper use of mem::zeroed and ManuallyDrop instead of MaybeUninit. This issue was part of a larger fix that addressed several unsoundness issues in the crossbeam library's implementation (Crossbeam PR).
The vulnerability could potentially lead to undefined behavior in applications using affected versions of the crossbeam-queue crate, particularly in scenarios involving memory management and initialization (Debian Tracker).
The issue has been fixed in version 0.3.5-1 and later releases. Users should upgrade to these newer versions to address the vulnerability. The fix involved replacing unsafe memory handling code with the safer MaybeUninit implementation (Debian Tracker, Crossbeam PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."