pancurses
These reviews are from Crev, a distributed system for code reviews. To add your review, set up cargo-crev
.
The current version of pancurses is 0.17.0.
0.16.1 (older version) Thoroughness: None Understanding: None
by dpc on 2019-06-21
0.15.0 (older version) Thoroughness: None Understanding: None
by dpc on 2019-07-01
Show review…
-
Issue: Medium (RUSTSEC-2019-0005)
This review is from cargo-vet. To add your review, set up cargo-vet
and submit your URL to its registry.
The current version of pancurses is 0.17.0.
0.16.1 (older version)
From kornelski/crev-proofs copy of git.savannah.gnu.org.
Packaged for Guix (crates-io)
cargo-vet does not verify reviewers' identity. You have to fully trust the source the audits are from.
- unknown
-
May have been packaged automatically without a review
Crates in the crates.io registry are tarball snapshots uploaded by crates' publishers. The registry is not using crates' git repositories. There is absolutely no guarantee that the repository URL declared by the crate belongs to the crate, or that the code in the repository is the code inside the published tarball.
To review the actual code of the crate, it's best to use cargo crev open pancurses
. Alternatively, you can download the tarball of pancurses v0.17.0 or view the source online.
pancurses::mvprintw
andpancurses::printw
passes a pointer from a rust&str
to C, allowing hostile input to execute a format string attack, which trivially allows writing arbitrary data to stack memory.CVE-2019-15546
GHSA-m57c-4vvx-gjgq