I reviewed rust-sequoia-sqv 1.3.0-3ubuntu1 as checked into resolute. This
shouldn't be considered a full audit but rather a quick gauge of
maintainability.

`rust-sequoia-sqv` is a simple signature verification program which
verifies detached OpenPGP signatures. It is a replacement for `gpgv`.
Unlike `gpgv`, it can take additional constraints on the signature into
account.

- CVE History
  - no CVE history
- Build-Depends
  - debhelper-compat, dh-sequence-cargo, bash-completion
  - all 3 are in main and seem to be standard
- pre/post inst/rm scripts
  - none present
- init scripts
  - none present
- systemd units
  - none present
- dbus services
  - none present
- setuid binaries
  - none present
- binaries in PATH
  - ./usr/bin/sqv, which is expected
- sudo fragments
  - none present
- polkit files
  - none present
- udev rules
  - none present
- unit tests / autopkgtests
  - has build tests, but no autopkgtests
- cron jobs
  - none present
- Build logs
  - normal build log, with some minor warnings related to deprecation of
    `DateTime::from_utc` function

- Processes spawned
  - no spawned processes
- Memory management
  - unsupported for rust
- File IO
  - none
- Logging
  - no obvious secret leakage like passwords, tokens, private keys, or
    environment contents
- Environment variable usage
  - none
- Use of privileged functions
  - no privileged functions
- Use of cryptography / random number sources etc
  - `sqv` relies on vendored `sequoia-openpgp` for essentially all
    crypto-related tasks such as key binding, revocation, key-usage, and
    algorithm acceptance decisions
- Use of temp files
  - no temporary files
- Use of networking
  - no networking
- Use of WebKit
  - none
- Use of PolicyKit
  - none

- Any significant Coverity results
  - none
- Any significant shellcheck results
  - none
- Any significant Semgrep results
  - none

- Two of the vendored packages are currently vulnerable (reported by 
osv-scanner)
    - `openssl` v0.10.71 is vulnerable to CVE-2025-3416. Although it's a
      rust wrapper around the system openssl library, the vulnerability is
      in the wrapper itself. 
    - `sequoia-openpgp`v2.0.0 is vulnerable to CVE-2025-67897, which is a
      vendored rust crate source.

Security team ACK for promoting `rust-sequoia-sqv` to main if and only if
the vulnerable vendored packages are upgraded to patched versions
(`openssl` to v0.10.72) and (`sequoia-openpgp` to 2.1.0).


** CVE added: https://cve.org/CVERecord?id=CVE-2025-3416

** CVE added: https://cve.org/CVERecord?id=CVE-2025-67897

** Changed in: rust-sequoia-sqv (Ubuntu)
       Status: New => In Progress

** Changed in: rust-sequoia-sqv (Ubuntu)
     Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2089690

Title:
  [MIR] rust-sequoia-sqv

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnupg2/+bug/2089690/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to