I reviewed yaml-cpp version 0.6.2-4fakesync1 as packaged in
So, security team ACK on promoting yaml-cpp to main is granted provided
sarnold@hunt:~/ubuntu/security/audits/yaml-cpp/disco/audits$ cat bug.txt 
I reviewed yaml-cpp version 0.6.2-4fakesync1 as packaged in
disco-proposed. This shouldn't be considered a full security audit but
rather a quick gauge of maintainability.

- There are six CVEs found since 2017 and as far as I can tell none have
  been addressed since they were discovered. The library appears to be
  entirely unsuitable for handling untrusted input. (And even for trusted
  input, crashing rather than returning an error message is really poor
  user experience.)

  If we're going to have this in main, then we need to work with upstream
  to provide the missing reliability.

- Build-Depends: cmake, debhelper
- Does no cryptography
- Does no networking
- Does not daemonize
- No pre/post inst/rm scripts
- No init scripts
- No systemd unit files
- No dbus service files
- No setuid files
- No executables in PATH
- No sudo fragments
- No udev rules
- Decent-sized test suite run during build
- No cron jobs
- Some CMake warnings, large number of warnings from test suite, nothing
  too bad

- Does not spawn subprocesses
- Older c++ style memory management
- util/parse.cpp can take a filename in argv[1]
- Probably insufficient logging for real use, but logging looked safe
- No environment variable use
- No privileged functions
- No cryptography
- No networking
- No privleged portions of code
- No temp files
- No webkit
- cppcheck results only in test suite
- No policykit

The code is clean and simple, but perhaps too simple -- the six open
CVEs show insufficient handling for unexpected inputs. This library is
currently unsafe for use on untrusted inputs, and will probably give a
poor user experience for innocent typos.

So, security team ACK on promoting yaml-cpp to main is granted provided
that the requesting team:

- Promises to work with upstream developers to handle the six currently
  open CVEs. Obviously I can't expect anyone to promise that upstream will
  be receptive, but the responses to github issues appears like help would
  be accepted positively.

  If upstream doesn't respond, we'll need to either carry a delta or work
  with Debian to carry a delta.

- Address the lack of FORTIFY_SOURCE in build log. I didn't investigate
  how it came to lack FORTIFY_SOURCE, I just didn't see it in the logs
  where I expected to see it.

Thanks


** Changed in: yaml-cpp (Ubuntu)
     Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1794692

Title:
  [MIR] [mir] yaml-cpp

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/yaml-cpp/+bug/1794692/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to