Skip to content

Commit d85adb9

Browse files
committed
README: Leave notice on inherit integrity weaknesses of repo fetches
Neither git nor hg currently provide a production-ready replacement for weak SHA-1 commit IDs. Furthermore, kas mixes commit IDs and symbolic commit names in refspec. This permits attackers who gained control over a repository that kas fetches from to present manipulated content without kas noticing this. Aditya Sirish A Yelgundhalli recently reported one potential attack scenario, using branches that shadow commit IDs. While trying to mitigate this particular case, it became clear that there is no simple solutions with the given tools and interfaces. For now, warn prominently that only trusted sources should be used. There are extensions planned to address the issue at its root, likely by introducing content checksums. Signed-off-by: Jan Kiszka <[email protected]>
1 parent 78084c0 commit d85adb9

File tree

1 file changed

+9
-0
lines changed

1 file changed

+9
-0
lines changed

README.rst

+9
Original file line numberDiff line numberDiff line change
@@ -31,3 +31,12 @@ Key features provided by the build tool:
3131
- initiate bitbake build process
3232

3333
See the `kas documentation <https://kas.readthedocs.io>`_ for further details.
34+
35+
SECURITY NOTICE
36+
---------------
37+
38+
At this stage, kas does not validate the integrity of fetched repositories.
39+
Make sure to only pull from trusted sources to ensure that the selected
40+
revisions are the expected ones, specifically when using mirrors. Later
41+
versions of kas may introduce integrity validation mechanisms such as
42+
cryptographic checksums to strengthen supply chain security.

0 commit comments

Comments
 (0)