Files
advisory-db/crates/pancurses/RUSTSEC-2019-0005.toml
Tony Arcieri 01ac6725d5 Fix all advisories to pass linter
Mostly related to the `affected_functions` field, which has changed a
few times.
2019-09-09 12:19:01 -07:00

17 lines
530 B
TOML

[advisory]
id = "RUSTSEC-2019-0005"
package = "pancurses"
date = "2019-06-15"
title = "Format string vulnerabilities in `pancurses`"
description = """
`pancurses::mvprintw` and `pancurses::printw` passes a pointer from a rust `&str` to C,
allowing hostile input to execute a format string attack, which trivially allows writing
arbitrary data to stack memory.
"""
patched_versions = []
url = "https://github.com/RustSec/advisory-db/issues/106"
[affected.functions]
"pancurses::mvprintw" = [">= 0"]
"pancurses::printw" = [">= 0"]