I reviewed libcue (2.2.1-2) from disco. This is not a full security audit but
rather a quick gauge of maintainability.
libcue is a library to parse CUE sheets / files (metadata which describes how
tracks of a CD or DVD are layed out). Stored as plain text and commonly have
the .cue extension. Parsed via flex / bison.
- Build dependencies:
- bison, cmake, debhelper-compat, flex
- No CVE history
- no pre or postinst scripts
- no systemd unit files
- no system dbus services
- no setuid files
- no binaries in PATH
- no sudo fragments
- no udev rules
- tests run during the build, seems reasonably extensive
- no cron jobs
- clean build log other than warning regarding possible buffer overflow in
time_frame_to_mmssff() - see below
- doesn't spawn other processes
- memory management looked careful
- file IO - reads from FILE* via flex, doesn't directly open files
- minimal logging, looked fine
- no environment variables used
- no ioctl() or other privileged syscalls
- Does not use cryptography
- Does not use DBus
- Does not use webkit
- Does not use temporary files
- Does not use javascript
- No cppcheck errors
- Does not use polkit
- Potential for signed integer overflow in time_msf_to_frame() if time is
negative
- Potential for buffer overflow in time_frame_to_mmssff() if time is negative
- Both would be fixed if time was treated everywhere as an unsigned quantity
rather than signed integral types (int/long)
- ACK from security team to promote to main.
** Changed in: libcue (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1770871
Title:
[MIR] libcue
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libcue/+bug/1770871/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs