I reviewed libcue (2.2.1-2) from disco. This is not a full security audit but rather a quick gauge of maintainability.
libcue is a library to parse CUE sheets / files (metadata which describes how tracks of a CD or DVD are layed out). Stored as plain text and commonly have the .cue extension. Parsed via flex / bison. - Build dependencies: - bison, cmake, debhelper-compat, flex - No CVE history - no pre or postinst scripts - no systemd unit files - no system dbus services - no setuid files - no binaries in PATH - no sudo fragments - no udev rules - tests run during the build, seems reasonably extensive - no cron jobs - clean build log other than warning regarding possible buffer overflow in time_frame_to_mmssff() - see below - doesn't spawn other processes - memory management looked careful - file IO - reads from FILE* via flex, doesn't directly open files - minimal logging, looked fine - no environment variables used - no ioctl() or other privileged syscalls - Does not use cryptography - Does not use DBus - Does not use webkit - Does not use temporary files - Does not use javascript - No cppcheck errors - Does not use polkit - Potential for signed integer overflow in time_msf_to_frame() if time is negative - Potential for buffer overflow in time_frame_to_mmssff() if time is negative - Both would be fixed if time was treated everywhere as an unsigned quantity rather than signed integral types (int/long) - ACK from security team to promote to main. ** Changed in: libcue (Ubuntu) Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1770871 Title: [MIR] libcue To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libcue/+bug/1770871/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs