Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <551081E2.8000607@openwall.com>
Date: Tue, 24 Mar 2015 00:13:06 +0300
From: Alexander Cherepanov <ch3root@...nwall.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE for Kali Linux

On 2015-03-23 13:38, Marcus Meissner wrote:
>> There are some attacks even if you verify signatures, e.g. serving
>> old, known-vulnerable versions. HTTPS can help here (until
>> signatures start to be widely accompanied by expiring timestamps or
>> something).
>
> SUSE has added an expiry tag in the YUM metadata for such cases.

It's nice to see progress in this area. Does SUSE guard against other 
attacks from [1] too?

[1] https://isis.poly.edu/~jcappos/papers/cappos_pmsec_tr08-02.pdf

-- 
Alexander Cherepanov

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.