Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.
References
Link | Resource |
---|---|
https://github.com/theupdateframework/tuf/releases/tag/v0.12.0 | Third Party Advisory |
https://github.com/theupdateframework/tuf/security/advisories/GHSA-f8mr-jv2c-v8mg | Third Party Advisory |
https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7 | Broken Link |
https://pypi.org/project/tuf | Product Vendor Advisory |
https://github.com/theupdateframework/tuf/pull/885 | Patch Third Party Advisory |
Configurations
Information
Published : 2020-09-09 11:15
Updated : 2021-11-18 09:45
NVD link : CVE-2020-15163
Mitre link : CVE-2020-15163
JSON object : View
CWE
CWE-345
Insufficient Verification of Data Authenticity
Products Affected
linuxfoundation
- the_update_framework