I reviewed snapd-glib version 0.14-0ubuntu1 as checked into yakkety. This
shouldn't be considered a full security audit; in fact, it was entirely
too hasty due to external time pressures.
Most calls appeared to check for error returns. I found a few instances
that didn't:
- send_request() doesn't check error return from
snapd_auth_data_get_macaroon() but hands the result directly to
g_string_append_printf(); 'Macaroon root="(null)"' is the possible
outcome. Is this tolerable?
- send_request() doesn't check error return from
snapd_auth_data_get_discharges() but hands the result directly to a
for loop that will sigsegv
It's an insane pity this handles HTTP directly. Chunked encoding has
been the source of many vulnerabilities. Maybe investigate if a library
such as yahttp or other choices are available to outsource the potential
trouble. This is probably not a big deal here, since the point is to talk
to a more-privileged tool. Still, HTTP is subtle.
I'd like to spend more time reviewing this in the next cycle, but I think
in the meantime we can accept it for yakkety without undue risk.
Security team ACK for promoting snapd-glib to main.
Thanks
** Changed in: snapd-glib (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1620159
Title:
[MIR] snapd-glib
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snapd-glib/+bug/1620159/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs