We got a report of a bug in our certificate pinning code. We confirm that this bug exists and currently does not affect f-droid.org. This bug can only be exploited when an upstream project is compromised first, and only new installations will be affected. Therefore, we consider this bug of low urgency. We're looking into the reporter's patches + thank them for their work.
Further work on this gets tracked at https://gitlab.com/fdroid/fdroidserver/-/issues/1251
@fdroidorg please do look into it. Supply chain attacks are a thing lately.
@tinx @fdroidorg this is not a classical supply chain attack. It's just about one of F-Droids safeguards malfunctioning under very specific conditions. It's fixed. I've also looked into it, and as far as I can tell on f-droid.org only 14 apps were susceptible and I couldn't find any evidence for active exploits.
(Unsurprisingly so, because for this to work an attacker would have to hack an app upstream first. When an attacker is in that position, there are way easier routes to do damage.)