Package: apt-offline
Version: 1.6.1
Severity: wishlist

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hi,
Does apt-offline check the clock (and use valid-until) so it isn't
vulnerable to a MITM showing an old version of the archive with a known
critical bug meanwhile that bug has been fixed in the present?

Information about this can be found on bug #752450, a debian-devel thread
talking about the same bug[1] or a debian-devel thread about attacks on
package managers[2]

[1]: http://thread.gmane.org/gmane.linux.debian.devel.bugs.general/1163225
[2]:
http://thread.gmane.org/gmane.linux.debian.devel.general/152551/focus=152579



- -- System Information:
Debian Release: stretch/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armhf

Kernel: Linux 4.1.0-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages apt-offline depends on:
ii  apt                                    1.0.10.2
ii  less                                   458-3
ii  libpython2.7-stdlib [python-argparse]  2.7.10-4
ii  python                                 2.7.9-1
pn  python:any                             <none>

Versions of packages apt-offline recommends:
ii  debian-archive-keyring  2014.3
ii  python-magic            1:5.24-2
ii  python-soappy           0.12.22-1

apt-offline suggests no packages.

- -- no debconf information

-----BEGIN PGP SIGNATURE-----

iQEcBAEBCgAGBQJWCtxaAAoJECI/Fcparw54kiMH/iHVeLUxRiYeBVr/i85yQN0X
YYlyJevMIK0AB0q0pdyhJ23pCG5QL+4lslLX2TrpMDgBsQL1RLcpnTjlRj8ZUcVo
I8X/g8EH/yc27w18rJxcjCL+Rp9bz1NJOH6RGlI1zbEwsCNfsB1IKp9g/gNtBoYF
dE7TkPHO3MNeiElJcKdZFX9DOv+rqnvlg3fYdjPPtNEhQ0ZFCcmJGIF5lhkvAesi
APDLV61SDOms4Vsss8VG5v1GEpn+ME7NX5iKuhFteNnFgTYVBYUUlCOg4GMn834/
pqC3JO+I68LcBeT9secEg+cNhwSXbZ0M/rXdWGGXG1yYetfWahzr+SrE7mRpjkM=
=tKWY
-----END PGP SIGNATURE-----

Reply via email to