apko doesn't verify downloaded apk packages against APKINDEX checksum (package substitution possible)
Description
Published to the GitHub Advisory Database
May 4, 2026
Reviewed
May 4, 2026
Published by the National Vulnerability Database
May 9, 2026
Last updated
May 13, 2026
apko verifies the signature on
APKINDEX.tar.gzbut never compares individually downloaded.apkpackages against the checksum recorded in the signed index. The checksum is parsed and available viaChecksumString(), and the downloaded package control hash is computed, but the two values are never compared ingetPackageImpl(). Mismatched packages are silently accepted. An attacker who can substitute download responses (compromised mirror, HTTP repository, poisoned CDN cache) can install arbitrary packages into built images.Fix: No fix available yet.
Acknowledgements
apko thanks Oleh Konko from 1seal for discovering and reporting this issue.
References