floss.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
For people who care about, support, and build Free, Libre, and Open Source Software (FLOSS).

Administered by:

Server stats:

686
active users

IzzyOnDroid ✅

Another patch has been applied at the to protect against what is described at openwall.com/lists/oss-securit

Though a full scan of the repo hasn't brought up a single affected APK, that doesn't mean any such cannot show up later – so better safe than sorry, right?

www.openwall.comoss-security - [Update] PoC for fdroidserver AllowedAPKSigningKeys certificate pinning bypass

@IzzyOnDroid
Thank you for making Foss world more secure.

@IzzyOnDroid Why not adopt the apksigner itself instead of using a custom implementation?

@IzzyOnDroid @muntashir using apksig is indeed what I recommended as a proper fix. I also have some code for doing just that. but using that would be a nontrivial patch to maintain and fdroidserver upstream doesn't want to go that route for some reason, insisting on using a pure python implementation (though AFAIK no complete one exists yet).

gist.github.com/obfusk/cfab950

Gistverify APK and get SHA-256 of first certverify APK and get SHA-256 of first cert. GitHub Gist: instantly share code, notes, and snippets.

@muntashir @IzzyOnDroid oh, interesting. apksigner should still be able to validate the signature when manually passing min and max sdk (as it then doesn't parse the AXML, which can be entirely absent then). but such odd inconsistencies happen, yeah (like the res0/res1 androguard issue as well). I don't think my AXML parser handles the null chunk case correctly either. will check. thanks.