Doesn't this bug allow malicious users to root any Ubuntu system
connected to a wifi cafe that uses web logon and no encryption?

I'm not sure if I understand this, but it seems like proxies can insert
URLs into the apt lists at will. And at logon-style wifi cafe's, a
malicious user sitting at the table next to you could impersonate the
cafe proxy (MITM), potentially inserting whatever they like into the
lists URL. Wouldn't this then affect the Ubuntu upgrade and update
cycles, redirecting requests to those chosen by the malicious laptop
owner, perhaps weeks late while not connected to the malicious proxy?
Perhaps the user would be required to accept some bogus security
certificate before downloading the malicious code--so maybe only 10% of
infected Ubuntu users would be caught. But might it be possible that if
the user updates/upgrades while still connected through the malicious
proxy, the proxy could peform a MITM on the certificates and still get
the user to unknowingly install whatever "upgrades" the malicious user
intends, to root the wifi user's system.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/346386

Title:
  [MASTER] Update fails with invalid package files with "Encountered a
  section with no Package: header"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/346386/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to