On Tue, Dec 02, 2003 at 06:05:44PM +0100, Andreas Metzler wrote:
> Joey Hess <[EMAIL PROTECTED]> wrote:
> > Goswin von Brederlow wrote:
> >> > dpkg that it is downgrading the package, and a clever attacker might
> >> > avoid even that.

> >> How would you avoid it?

> > Make the replacement package really be a different package entirely, of
> > a higher version than the package it purports to replace.

> > I think aj had some more examples along these lines the last time this
> > came up.

> I still don't understand how you change the version number (or the
> package-name) without breaking the signature.

You change the contents of the compromised Packages file, so that 

Package: bash
Essential: yes
Priority: required
Section: base
Architecture: i386
Version: 2.05b-12

is accompanied by

Filename: pool/main/b/bash/vulnerable-ident-server_1.0-1_i386.deb

which contains a perfectly valid .deb file, signed by a DD, that has
nothing whatsoever to do with bash.

AFAIK, apt does not sanity check the relationship between package names
and filenames (and it's not obvious that this should be part of its
responsibilities), and dpkg only gets a list of .debs to install once
they've been downloaded.

-- 
Steve Langasek
postmodern programmer

Attachment: pgpKafKvfobmu.pgp
Description: PGP signature

Reply via email to