RUSTSEC-2020-0021

rio allows a use-after-free buffer access when a future is leaked

Issued
Package
rio (crates.io)
Type
Vulnerability
Categories
  • memory-corruption
  • memory-exposure
Aliases
Details
https://github.com/spacejam/rio/issues/11
Patched
no patched versions

Description

When a rio::Completion is leaked, its drop code will not run. The drop code is responsible for waiting until the kernel completes the I/O operation into, or out of, the buffer borrowed by rio::Completion. Leaking the struct will allow one to access and/or drop the buffer, which can lead to a use-after-free, data races or leaking secrets.

Upstream is not interested in fixing the issue.

More