RUSTSEC-2019-0006: Buffer overflow and format vulnerabilities in functions exposed without unsafe
Closed this issue · 2 comments
github-actions commented
Buffer overflow and format vulnerabilities in functions exposed without unsafe
Details | |
---|---|
Package | ncurses |
Version | 5.101.0 |
URL | rustsec/advisory-db#106 |
Date | 2019-06-15 |
ncurses
exposes functions from the ncurses library which:
- Pass buffers without length to C functions that may write an arbitrary amount of
data, leading to a buffer overflow. (instr
,mvwinstr
, etc) - Passes rust &str to strings expecting C format arguments, allowing hostile
input to execute a format string attack, which trivially allows writing
arbitrary data to stack memory (functions in theprintw
family).
See advisory page for additional details.
acz2022 commented
I wonder why this issue has been closed? I don't see any mention of it being fixed?
philphilphil commented
switched from ncurses to termion for the TUI