- Reported
 
      - 
        
      
 
      - Issued
 
      - 
        
        
        
        
      
 
      - Package
 
      - 
        
        
        rio
          (crates.io)
        
        
      
 
      - Type
 
      - 
        
        Vulnerability
        
      
 
      
      - Categories
 
      - 
        
      
 
      
      
      
      - Aliases
 
      - 
        
      
 
      
      
      - References
 
      - 
        
      
 
      
      
      
      - CVSS Score
 
      - 9.8 
        CRITICAL
      
 
      - CVSS Details
 
      - 
        
          
            - Attack Vector
 
            - Network
 
          
            - Attack Complexity
 
            - Low
 
          
            - Privileges Required
 
            - None
 
          
            - User Interaction
 
            - None
 
          
            - Scope
 
            - Unchanged
 
          
            - Confidentiality Impact
 
            - High
 
          
            - Integrity Impact
 
            - High
 
          
            - Availability Impact
 
            - High
 
          
        
       
      - CVSS Vector
 
      
          - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
 
        
      
      - Patched
 
      - 
        
        no patched versions
        
      
 
      
      
      
    
    
    
    Description
    When a rio::Completion is leaked, its drop code will not run. The drop code
is responsible for waiting until the kernel completes the I/O operation into, or
out of, the buffer borrowed by rio::Completion. Leaking the struct will allow
one to access and/or drop the buffer, which can lead to a use-after-free,
data races or leaking secrets.
Upstream is not interested in fixing the issue.
    Advisory available under CC0-1.0
    license.