ArchLinux: 201507-23: pacman: silent downgrade
Summary
A flaw has been discovered in pacman that is leading to possible silent package downgrade when exploited. While loading each package it was not ensured that the internal version matches the expected database version, leading to the possibility to circumvent the version check. This issue can be used by an attacker to trick the software into installing an older version. This behavior can be exploited by a man-in-the-middle attack through specially crafted database tarball containing a higher version, yet actually delivering an older and vulnerable version, which was previously shipped.
Resolution
Upgrade to 4.2.1-2.
# pacman -Syu "pacman>=4.2.1-2"
The problem has been fixed upstream but no release is available yet.
References
https://lists.archlinux.org/pipermail/pacman-dev/2015-July/020238.html https://bugs.archlinux.org/task/45687
Workaround
None.