I reviewed jansson version 2.7-1ubuntu1 as checked into vivid. This should
not be considered a full security audit but rather a quick gauge of
maintainability.
- jansson provides a C api for working with json files
- Build-Depends: debhelper, dh-autoreconf
- Does not itself daemonize
- Does not itself run as a system user
- No pre/post inst/rm
- No initscripts
- No dbus services
- No setuid
- No binaries in *bin/
- No sudo fragments
- No udev rules
- No cronjobs
- Almost no tests run during build
- Clean build logs
- No subprocesses spawned
- Most memory management looks good, some potential for integer overflow
exists
- File opening looks safe
- Logging looks safe
- Environment variables only used in test programs
- No privileged operations
- No cryptography
- Does not itself do networking
- No tmp file use
- Does not use WebKit
- Does not use JS
- Does not use PolicyKit
- Clean cppcheck
Here's a few small issues I found while reviewing the source in the hopes
someone finds them useful:
- loadfile() in test/bin/json_process.c does malloc(fsize+1), no checks
that fsize+1 doesn't wrap-around
- multiple cases of malloc(size * sizeof(foo)); a calloc()-style function
that checks for integer overflows ought to be used instead
Jansson looks like high-quality code with a friendly API for manipulating
JSON in C.
Security team ACK for promoting jansson to main.
Thanks
** Changed in: jansson (Ubuntu)
Assignee: Seth Arnold (seth-arnold) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1392023
Title:
[MIR] jansson
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jansson/+bug/1392023/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs