pancurses::mvprintw
and pancurses::printw
passes a pointer from a rust &str
to C,
allowing hostile input to execute a format string attack, which trivially allows writing
arbitrary data to stack memory.
git-interactive-rebase-tool 1.1.0
This project contains known security vulnerabilities. Find detailed information at the bottom.
git-interactive-rebase-tool
(5 total, 3 outdated, 1 insecure, 1 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
chrono ⚠️ | ^0.4 | 0.4.37 | maybe insecure |
clap | ^2.32.0 | 4.5.4 | out of date |
git2 | ^0.7.2 | 0.18.3 | out of date |
pancurses ⚠️ | ^0.16 | 0.17.0 | insecure |
unicode-segmentation | ^1.1.0 | 1.11.0 | up to date |
pancurses
: Format string vulnerabilities in `pancurses`pancurses::mvprintw
and pancurses::printw
passes a pointer from a rust &str
to C,
allowing hostile input to execute a format string attack, which trivially allows writing
arbitrary data to stack memory.
chrono
: Potential segfault in `localtime_r` invocationsUnix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.
No workarounds are known.