This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate cursive

Dependencies

(17 total, 3 outdated, 2 insecure)

CrateRequiredLatestStatus
 ahash^0.80.8.11up to date
 bear-lib-terminal^22.0.0up to date
 cfg-if^11.0.0up to date
 crossbeam-channel^0.50.5.12up to date
 crossterm^0.250.27.0out of date
 cursive_core^0.3.00.3.7up to date
 lazy_static^11.4.0up to date
 libc^0.20.2.153up to date
 log^0.40.4.21up to date
 maplit^1.01.0.2up to date
 ncurses ⚠️^5.99.06.0.0insecure
 pancurses ⚠️^0.170.17.0insecure
 signal-hook^0.30.3.17up to date
 term_size^0.30.3.2up to date
 termion^13.0.0out of date
 unicode-segmentation^11.11.0up to date
 unicode-width^0.10.1.12up to date

Dev dependencies

(3 total, all up-to-date)

CrateRequiredLatestStatus
 atty^0.20.2.14up to date
 pretty-bytes^0.20.2.2up to date
 rand^0.80.8.5up to date

Security Vulnerabilities

pancurses: Format string vulnerabilities in `pancurses`

RUSTSEC-2019-0005

pancurses::mvprintw and pancurses::printw passes a pointer from a rust &str to C, allowing hostile input to execute a format string attack, which trivially allows writing arbitrary data to stack memory.

ncurses: Buffer overflow and format vulnerabilities in functions exposed without unsafe

RUSTSEC-2019-0006

ncurses exposes functions from the ncurses library which:

  • Pass buffers without length to C functions that may write an arbitrary amount of data, leading to a buffer overflow. (instr, mvwinstr, etc)
  • Passes rust &str to strings expecting C format arguments, allowing hostile input to execute a format string attack, which trivially allows writing arbitrary data to stack memory (functions in the printw family).