[Git][reproducible-builds/reproducible-website][master] 2024-04: fix paragraph about my work
FC (Fay) Stegerman (@obfusk)
gitlab at salsa.debian.org
Thu May 9 01:58:01 UTC 2024
FC (Fay) Stegerman pushed to branch master at Reproducible Builds / reproducible-website
Commits:
013d861f by FC (Fay) Stegerman at 2024-05-09T03:57:40+02:00
2024-04: fix paragraph about my work
- - - - -
1 changed file:
- _reports/2024-04.md
Changes:
=====================================
_reports/2024-04.md
=====================================
@@ -42,13 +42,13 @@ Later in the most, Morten mentions that he was motivated to write the post becau
<br>
-### Certificate vulnerabilities in Android's `apksigner`
+### Certificate vulnerabilities in F-Droid's `fdroidserver`
-In early April, Fay Stegerman [announced a certificate pinning bypass vulnerability and Proof of Concept (PoC)](https://www.openwall.com/lists/oss-security/2024/04/08/8) in the Android `apksigner` tool to the [`oss-security`](https://www.openwall.com/lists/oss-security/) mailing list. This tool is crucial to the validity of artifacts in the Android software supply chain.
+In early April, Fay Stegerman [announced a certificate pinning bypass vulnerability and Proof of Concept (PoC)](https://www.openwall.com/lists/oss-security/2024/04/08/8) in the F-Droid `fdroidserver` tools for "managing builds, indexes, updates, and deployments for F-Droid repositories" to the [`oss-security`](https://www.openwall.com/lists/oss-security/) mailing list.
-> We observed that embedding a v1 (JAR) signature file in an APK with `minSdk` >= 24 will be ignored by Android/apksigner, which only checks v2/v3 in that case. However, since fdroidserver checks v1 first, regardless of minSdk, and does not verify the signature, it will accept a "fake" certificate and see an incorrect certificate fingerprint.
+> We observed that embedding a v1 (JAR) signature file in an APK with `minSdk` >= 24 will be ignored by Android/apksigner, which only checks v2/v3 in that case. However, since `fdroidserver` checks v1 first, regardless of `minSdk`, and does not verify the signature, it will accept a "fake" certificate and see an incorrect certificate fingerprint. […] We also realised that the above mentioned discrepancy between `apksigner` and `androguard` (which `fdroidserver` uses to extract the v2/v3 certificates) can be abused here as well. […]
-Later on in the month, Fay followed up with a second post detailing a script that [could be used to scan for potentially affected `.apk` files](https://www.openwall.com/lists/oss-security/2024/04/20/3) and mentioned that, whilst upstream had acknowledged the vulnerability, they had not yet applied any ameliorating fixes.
+Later on in the month, Fay followed up with a second post detailing a third vulnerability and a script that [could be used to scan for potentially affected `.apk` files](https://www.openwall.com/lists/oss-security/2024/04/20/3) and mentioned that, whilst upstream had acknowledged the vulnerability, they had not yet applied any ameliorating fixes.
<br>
View it on GitLab: https://salsa.debian.org/reproducible-builds/reproducible-website/-/commit/013d861f30a93f5332fe8a5cbb69edb8cd35b119
--
View it on GitLab: https://salsa.debian.org/reproducible-builds/reproducible-website/-/commit/013d861f30a93f5332fe8a5cbb69edb8cd35b119
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.reproducible-builds.org/pipermail/rb-commits/attachments/20240509/65479e33/attachment.htm>
More information about the rb-commits
mailing list