1 |
On Sun, Sep 14, 2014 at 10:38:41PM +0000, hasufell wrote: |
2 |
> Yes, there is a possible attack vector mentioned in this comment |
3 |
> https://bugs.gentoo.org/show_bug.cgi?id=502060#c16 |
4 |
|
5 |
From that comment, the point 1.2 is highly unlikely [1]: |
6 |
|
7 |
1. Attacker constructs a init.d script, regular part at the start, |
8 |
malicious part at the end |
9 |
1.1. This would be fairly simple, just construct two start() |
10 |
functions, one of which is mundane, the other is malicious. |
11 |
1.2. Both variants of the script have the same SHA1... |
12 |
|
13 |
> So we'd basically end up using either "git cherry-pick" or "git am" |
14 |
> for "pulling" user stuff, so that we also sign the blobs. |
15 |
|
16 |
Rebasing the original commits doesn't protect you from the birthday |
17 |
attach either, because the vulnerable hash is likely going to still be |
18 |
in the rebased commit's tree. All rebasing does is swap the committer |
19 |
and drop the initial signature. |
20 |
|
21 |
Cheers, |
22 |
Trevor |
23 |
|
24 |
[1]: http://article.gmane.org/gmane.comp.version-control.git/210622 |
25 |
|
26 |
-- |
27 |
This email may be signed or encrypted with GnuPG (http://www.gnupg.org). |
28 |
For more information, see http://en.wikipedia.org/wiki/Pretty_Good_Privacy |