[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#665920: marked as done (apt: failed secure APT checks don't give errors and non-zero exit statuses in all cases)



Your message dated Fri, 14 Aug 2015 15:36:15 +0200
with message-id <20150814153533.GA31099@debian.org>
and subject line Re: Bug#665920: apt: failed secure APT checks don't give errors and non-zero exit statuses in all cases
has caused the Debian Bug report #665920,
regarding apt: failed secure APT checks don't give errors and non-zero exit statuses in all cases
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
665920: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=665920
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: apt
Version: 0.8.15.10
Severity: important


Hi.

I did some non-systematic tests on secure APT (with partially shocking results).

The following is at least true, for the download action of apt (and I guess
therefore of aptitude, too), perhaps for other actions (and or option combinations,
in which verifications should happen, too)

It does not give an error and exit code = 0 when the verification of the downloaded
file fails.


The check seems however to actually take place, cause if I modify the hashsums
in e.g. ftp.de.debian.org_debian_dists_unstable_main_binary-amd64_Packages for
the base-files binary package and I do an:
$ apt-get download base-files
Get:1 Downloading base-files 6.7 [69,4 kB]
Fetched 69,4 kB in 0s (134 kB/s)

All I get is:
l
total 78k
drwxr-xr-x 2 calestyo calestyo 4,1k Mar 27 03:00 .
drwx------ 6 calestyo calestyo 4,1k Mar 27 02:41 ..
-rw-r--r-- 1 calestyo calestyo  70k Mar  4 01:17 base-files_6.7_amd64.deb.FAILED


Generally I think that all kinds of verification errors should be treated as (most
severe) errors (not just warnings) and that the exit status should be non-zero.
Best would be to have special exit-code, that denotes that potential security issues
occured.


In the above case, renaming the file to .FAILED may seem enough, but one can never
know how the users uses the system, and perhaps relies on failed exit statuses.
Or imagine a (though stupid) script that downloads the .deb to a temp dir and
takes the only file of that dir (regardless of the .FAILED) and e.g. installs it.
I mean this would be badly written code, but we really should try to protect even
such cases, especailly when this is easily possible.


Cheers,
Chris.



btw: Perhaps someone can explain this:
I traced the process and get the following:
stat("/var/lib/apt/lists/ftp.de.debian.org_debian_dists_unstable_Release.gpg", 0x7fff750b4670) = -1 ENOENT (No such file or directory)
stat("/var/lib/apt/lists/_srv_local-package-archive_dists_unstable_Release.gpg", {st_mode=S_IFREG|0644, st_size=836, ...}) = 0

So while there is a Release.gpg for my local archive, there is none for Debian's.
Why and is this a security problem?



--- End Message ---
--- Begin Message ---
On Tue, Mar 27, 2012 at 03:12:07AM +0200, Christoph Anton Mitterer wrote:
> Package: apt
> Version: 0.8.15.10
> Severity: important
> 
> 
> Hi.
> 
> I did some non-systematic tests on secure APT (with partially shocking results).
> 
> The following is at least true, for the download action of apt (and I guess
> therefore of aptitude, too), perhaps for other actions (and or option combinations,
> in which verifications should happen, too)
> 
> It does not give an error and exit code = 0 when the verification of the downloaded
> file fails.
> 
> 
It exits with 100 in sid and experimental now.

-- 
Julian Andres Klode  - Debian Developer, Ubuntu Member

See http://wiki.debian.org/JulianAndresKlode and http://jak-linux.org/.

Be friendly, do not top-post, and follow RFC 1855 "Netiquette".
    - If you don't I might ignore you.

--- End Message ---

Reply to: