1 |
On Sun, 2004-11-07 at 12:01 +0000, Chris Bainbridge wrote: |
2 |
> The most likely attack is via a user submitted patch or ebuild being |
3 |
> added to the portage tree. Since the user generated the file, he can |
4 |
> also generate a corresponding exploit file with the same hash, and |
5 |
> then replace the original on the rsync mirrors. |
6 |
|
7 |
Except that even a user generated ebuild would be modified at the very |
8 |
least in the ebuild headers. While this can be accounted for by the |
9 |
original author/attacker, it makes it a bit more difficult. |
10 |
|
11 |
> It's an unlikely attack in practice since as already demonstrated if |
12 |
> you've compromised an rsync mirror you can already easily exploit |
13 |
> clients. |
14 |
|
15 |
Agreed. The people that would have the easiest access to such exploits |
16 |
would be developers, but on that same token, a developer could do such |
17 |
things anyway. |
18 |
|
19 |
-- |
20 |
Chris Gianelloni |
21 |
Release Engineering - Operations/QA Manager |
22 |
Games - Developer |
23 |
Gentoo Linux |