X-Original-To: alpine-user@lists.alpinelinux.org Received: from mail-it1-f181.google.com (mail-it1-f181.google.com [209.85.166.181]) by lists.alpinelinux.org (Postfix) with ESMTP id 646CCF81489 for ; Wed, 30 Jan 2019 15:48:34 +0000 (UTC) Received: by mail-it1-f181.google.com with SMTP id i145so10878677ita.4 for ; Wed, 30 Jan 2019 07:48:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=pJRWPFPpJzy972FTa9Hv8uWObAaiTUvaYO22hMcQnAE=; b=MdtW2gTiKxa86mG6933ym1BWYy0LYnkmLYnGa2ShAyWS0uCNWUOT1UXYuBEZjiGrDD k2eYcur9LDHDpTD47TKq2ctO7YJXdrehI4UYV+9GxeOvsBgO5poUCNyFwSt/dPxvxC8A ZCC80rGjybWIvW8y5rcerg5caB8PCPU/FWmhAH5+FVVUQl7mSY3rVZ7hUYHiOYQfDqkC up0ofs9HR3t5/ibDhEUdZSijihN+51diIjOJQ9qjkTQCgd1Zo44Yeh8NqRE+ojSZ6HX8 lrWE7qtACMGuHcBaE7l356Tackg5I0XPk1ngTgm4wouz18Dtx2E6mGsKHBP05n2Q5aOp gM3Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=pJRWPFPpJzy972FTa9Hv8uWObAaiTUvaYO22hMcQnAE=; b=Zl7y/FIHPNrMwvTOFZi0Do3n3mQyuJpdOzSywy36eG0jbCx3OjPO4HG3trxBfQDVym l4cQ4dO37wp11c2tgdJGERNc0OZO0bVTlsF2BcVzAImW769b6FhLaQB1BQa2jOdDrkOw e3VYeTdtAxzvQDfY5V6YPN+uktT+GAJZ2fpb/mFAaH5XO7ZChSkVf7QxQJRKSAnVRj9o s1GLNWPwCFcJkuq4FR36F9h9AVEFNeNsgekmwvWQYzfAPlVHIy7p/P/CtW7CGAhzVY7M QvP8IaGnGSCi3a6v3WLjXrqSLGndkWFThMReuAUNaeUMzuQ/lBtBS017ete1j0bPcdBY lElw== X-Gm-Message-State: AJcUukdNAWs9QbMYNPZ1kp4Mj2/zPOXcDyGuJKzo/9x7rQBYW1YQbGyg Iy/GIe/4jGM3Y2/2YIMyH2n8GbCdhtb0pKrj76akeMkMAtg= X-Google-Smtp-Source: ALg8bN6rJpbCut44KKAUQFfBPNxxbLSqLQ0hS4eYk0Oqm30ntqaycGQ4YQ0gd8iZ8+W0pct/kWyC+Hq9Y9/EnBI3VDc= X-Received: by 2002:a24:2e94:: with SMTP id i142mr7083198ita.157.1548863313374; Wed, 30 Jan 2019 07:48:33 -0800 (PST) X-Mailinglist: alpine-user Precedence: list List-Id: Alpine Development List-Unsubscribe: List-Post: List-Help: List-Subscribe: MIME-Version: 1.0 From: Euro Domenii Date: Wed, 30 Jan 2019 17:47:58 +0200 Message-ID: Subject: [alpine-user] Vulnerability mechanism of debian apt https://security-tracker.debian.org/tracker/CVE-2019-3462 applies to apk ? To: alpine-user@lists.alpinelinux.org Content-Type: multipart/alternative; boundary="000000000000997ae70580aed7fb" --000000000000997ae70580aed7fb Content-Type: text/plain; charset="UTF-8" Here is the IRC log: Thx! 15:16] == EuroDomenii [bc1b071d@gateway/web/freenode/ip.188.27.7.29] has joined #alpine-linux [15:16] Channel names begin with # (corrected automatically). [15:18] == mort___ [~Adium@2001:630:212:2ab:9c9:975:ed0f:babe] has joined #alpine-linux [15:18] == mort___ [~Adium@2001:630:212:2ab:9c9:975:ed0f:babe] has quit [Client Quit] [15:20] == nepochal [~nepochal@unaffiliated/nepochal] has quit [Quit: WeeChat 1.6] [15:21] == nepochal [~nepochal@unaffiliated/nepochal] has joined #alpine-linux [15:22] == tomato [~Tomato@unaffiliated/tomato] has joined #alpine-linux [15:24] Is there an equivalent of the apt vulnerability https://security-tracker.debian.org/tracker/CVE-2019-3462 for apk ? [15:24] == ids1024 [~ids1024@unaffiliated/ids1024] has quit [Ping timeout: 252 seconds] [15:25] In the past, Max Justicz has found https://justi.cz/security/2018/09/13/alpine-apk-rce.html [15:26] that issue was unrelated to redirects [15:26] == alpha_Aquilae [~ircII@233.194.196.77.rev.sfr.net] has quit [Ping timeout: 246 seconds] [15:26] EuroDomenii: this issue is was a little overhyped by author, imo [15:26] like apk and apt are different programs, with different approaches [15:27] mps: Security Issues are always overhyped [15:27] AinNero: right :) [15:27] except in this case, it didn't even get an own domain [15:27] with fancy website [15:28] if you know my blog, i have a rant up about reputation whoring in the ITsec industry [15:28] == tomato [~Tomato@unaffiliated/tomato] has quit [Ping timeout: 252 seconds] [15:28] thanks for reply [15:28] == tomato [~Tomato@unaffiliated/tomato] has joined #alpine-linux [15:28] I looked it earlier but forgot exact url [15:29] So, the apk packages are sanitizing correctly the redirects? [15:29] <@clandmeter> EuroDomenii: i dont know if we are vulnerable. The persons who could know are not online atm. [15:30] EuroDomenii: it is hard to inject package which is not passed official check on Alpine [15:30] EuroDomenii: apk does not use hashsums from repository server like debian does [15:30] that one could be used only if you install package from untrusted repo [15:31] <@clandmeter> EuroDomenii: the best way would be to verify it yourself and let us know. [15:31] but, if you install package from untrusted repo it is always risky [15:32] Thanks for the tips. I'm quite new to alpine. Anyway, it's may worth the vulnerability mechanism in debian, to check if it applies to alpine [15:32] <@clandmeter> EuroDomenii: some insight on that sec issue you mentioned https://git.alpinelinux.org/apk-tools/commit/?id=6484ed9849f03971eb48ee1fdc21a2f128247eb1 [15:33] also, in Debian if someone add package with 'rm -rf /' in post-install you are doomed --000000000000997ae70580aed7fb Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Here is the IRC log:=C2=A0
Thx!

15:16] =3D=3D EuroDomenii [bc1b071d@gateway/= web/freenode/ip.188.27.7.29] has joined #alpine-linux
[15:16] Cha= nnel names begin with # (corrected automatically).
[15:18] =3D=3D= mort___ [~Adium@2001:630:212:2ab:9c9:975:ed0f:babe] has joined #alpine-lin= ux
[15:18] =3D=3D mort___ [~Adium@2001:630:212:2ab:9c9:975:ed0f:b= abe] has quit [Client Quit]
[15:20] =3D=3D nepochal [~nepochal@un= affiliated/nepochal] has quit [Quit: WeeChat 1.6]
[15:21] =3D=3D = nepochal [~nepochal@unaffiliated/nepochal] has joined #alpine-linux
[15:22] =3D=3D tomato [~Tomato@unaffiliated/tomato] has joined #alpine-l= inux
[15:24] <EuroDomenii> Is there an equivalent of the ap= t vulnerability https://security-tracker.debian.org/tracker/CVE-2019-3462 fo= r apk ?
[15:24] =3D=3D ids1024 [~ids1024@unaffiliated/ids1024] ha= s quit [Ping timeout: 252 seconds]
[15:25] <EuroDomenii> In= the past, Max Justicz has found https://justi.cz/security/2018/09/13/alpine-apk-= rce.html
[15:26] <AinNero> that issue was unrelated to = redirects
[15:26] =3D=3D alpha_Aquilae [~ircII@233.194.196.77.rev.sfr.net] has quit = [Ping timeout: 246 seconds]
[15:26] <mps> EuroDomenii: this= issue is was a little overhyped by author, imo
[15:26] <AinNe= ro> like apk and apt are different programs, with different approaches
[15:27] <AinNero> mps: Security Issues are always overhyped<= /div>
[15:27] <mps> AinNero: right :)
[15:27] <AinNe= ro> except in this case, it didn't even get an own domain
= [15:27] <AinNero> with fancy website
[15:28] <AinNero>= ; if you know my blog, i have a rant up about reputation whoring in the ITs= ec industry
[15:28] =3D=3D tomato [~Tomato@unaffiliated/tomato] h= as quit [Ping timeout: 252 seconds]
[15:28] <EuroDomenii> t= hanks for reply
[15:28] =3D=3D tomato [~Tomato@unaffiliated/tomat= o] has joined #alpine-linux
[15:28] <mps> I looked it earli= er but forgot exact url
[15:29] <EuroDomenii> So, the apk p= ackages are sanitizing correctly the redirects?
[15:29] <@clan= dmeter> EuroDomenii: i dont know if we are vulnerable. The persons who c= ould know are not online atm.
[15:30] <mps> EuroDomenii: it= is hard to inject package which is not passed official check on Alpine
[15:30] <AinNero> EuroDomenii: apk does not use hashsums from = repository server like debian does
[15:30] <mps> that one c= ould be used only if you install package from untrusted repo
[15:= 31] <@clandmeter> EuroDomenii: the best way would be to verify it you= rself and let us know.
[15:31] <mps> but, if you install pa= ckage from untrusted repo it is always risky
[15:32] <EuroDome= nii> Thanks for the tips. I'm quite new to alpine. Anyway, it's = may worth the vulnerability mechanism in debian, to check if it applies to = alpine
[15:32] <@clandmeter> EuroDomenii: some insight on t= hat sec issue you mentioned https://git.alpine= linux.org/apk-tools/commit/?id=3D6484ed9849f03971eb48ee1fdc21a2f128247eb1

--000000000000997ae70580aed7fb-- --- Unsubscribe: alpine-user+unsubscribe@lists.alpinelinux.org Help: alpine-user+help@lists.alpinelinux.org ---