This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate cursive

Dependencies

(16 total, 1 outdated, 2 insecure)

CrateRequiredLatestStatus
 ahash^0.80.8.11up to date
 bear-lib-terminal^22.0.0up to date
 cfg-if^11.0.0up to date
 crossbeam-channel^0.50.5.14up to date
 crossterm^0.28.10.28.1up to date
 cursive_core^0.4.00.4.6up to date
 lazy_static^11.5.0up to date
 libc^0.20.2.171up to date
 log^0.40.4.26up to date
 maplit^1.01.0.2up to date
 ncurses ⚠️^6.0.16.0.1insecure
 pancurses ⚠️^0.170.17.0insecure
 signal-hook^0.30.3.17up to date
 termion^44.0.4up to date
 unicode-segmentation^11.12.0up to date
 unicode-width^0.10.2.0out of date

Dev dependencies

(4 total, 1 outdated)

CrateRequiredLatestStatus
 pretty-bytes^0.20.2.2up to date
 rand^0.80.9.0out of date
 serde_json^1.0.851.0.140up to date
 serde_yaml^0.9.130.9.34+deprecatedup to date

Security Vulnerabilities

pancurses: Format string vulnerabilities in `pancurses`

RUSTSEC-2019-0005

pancurses::mvprintw and pancurses::printw passes a pointer from a rust &str to C, allowing hostile input to execute a format string attack, which trivially allows writing arbitrary data to stack memory.

ncurses: Buffer overflow and format vulnerabilities in functions exposed without unsafe

RUSTSEC-2019-0006

ncurses exposes functions from the ncurses library which:

  • Pass buffers without length to C functions that may write an arbitrary amount of data, leading to a buffer overflow. (instr, mvwinstr, etc)
  • Passes rust &str to strings expecting C format arguments, allowing hostile input to execute a format string attack, which trivially allows writing arbitrary data to stack memory (functions in the printw family).