RUSTSEC-2019-0005 on 2019-06-15: Format string vulnerabilities in pancurses

pancurses::mvprintw and pancurses::printw passes a pointer from a rust &str to C, allowing hostile input to execute a format string attack, which trivially allows writing arbitrary data to stack memory.

CVE-2019-15546

GHSA-m57c-4vvx-gjgq

These reviews are from Crev, a distributed system for code reviews. To add your review, set up cargo-crev.

The current version of pancurses is 0.17.0.


This review is from cargo-vet. To add your review, set up cargo-vet and submit your URL to its registry.

The current version of pancurses is 0.17.0.

cargo-vet does not verify reviewers' identity. You have to fully trust the source the audits are from.

unknown

May have been packaged automatically without a review


Lib.rs has been able to verify that all files in the crate's tarball, except Cargo.lock, are in the crate's repository with a git tag matching the version. Please note that this check is still in beta, and absence of this confirmation does not mean that the files don't match.

Crates in the crates.io registry are tarball snapshots uploaded by crates' publishers. The registry is not using crates' git repositories, so there is a possibility that published crates have a misleading repository URL, or contain different code from the code in the repository.

To review the actual code of the crate, it's best to use cargo crev open pancurses. Alternatively, you can download the tarball of pancurses v0.17.0 or view the source online.