- Reported
- 
        
      
- Issued
- 
        
        
        
        
      
- Package
- 
        
        
        rio
          (crates.io)
        
        
      
- Type
- 
        
        Vulnerability
        
      
- Categories
- 
        
      
- Aliases
- 
        
      
- References
- 
        
      
- CVSS Score
- 9.8 
        CRITICAL
      
- CVSS Details
- 
        
          
            - Attack Vector
- Network
- Attack Complexity
- Low
- Privileges Required
- None
- User Interaction
- None
- Scope
- Unchanged
- Confidentiality Impact
- High
- Integrity Impact
- High
- Availability Impact
- High
 
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Patched
- 
        
        no patched versions
        
      
Description
    When a rio::Completion is leaked, its drop code will not run. The drop code
is responsible for waiting until the kernel completes the I/O operation into, or
out of, the buffer borrowed by rio::Completion. Leaking the struct will allow
one to access and/or drop the buffer, which can lead to a use-after-free,
data races or leaking secrets.
Upstream is not interested in fixing the issue.
    Advisory available under CC0-1.0
    license.