[Bug 1037614] Re: Possible DoS attack via seemingly benign packages

Jamie Strandboge jamie at ubuntu.com
Fri Aug 17 21:02:50 UTC 2012


Thank you for using Ubuntu and reporting a bug. While the situation you
describe is certainly, installing malicious packages can do much more
since the maintainer script run as root on the system. This problem is
well understood and just like you shouldn't run untrusted binaries on
your system, you shouldn't install untrusted packages. Thanks again for
the report.

** Changed in: dpkg (Ubuntu)
       Status: New => Won't Fix

** Visibility changed to: Public

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to dpkg in Ubuntu.
https://bugs.launchpad.net/bugs/1037614

Title:
  Possible DoS attack via seemingly benign packages

Status in “dpkg” package in Ubuntu:
  Won't Fix

Bug description:
  For certain types of packages, there may be symlinks created via
  postinst or by triggers, which are not directly owned by any package.
  If another package provides an actual file that is the same name as
  one of these symlinks, dpkg will simply install the new file as
  Samefile.dpkg-new, but not record this in the info database. Upon
  removal of this new package, rather than simply removing the .dpkg-new
  version of the file, dpkg instead removes the target of the symlink
  (but not the symlink itself), resulting in the regular package being
  broken.

  This was discovered from the report of bug #1037294 where this exact
  situation happened by accident.

  Expanding on this accidental occurrence, a malicious package could
  render a DoS attack against the system, rendering it useless;
  installable from a PPA, external archive, or by coercion by through
  click-install from a hosted .deb on an arbitrary site.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1037614/+subscriptions




More information about the foundations-bugs mailing list