Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0224 | Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer. |
Github GHSA |
GHSA-f8mr-jv2c-v8mg | Invalid root may become trusted root in The Update Framework (TUF) |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T13:08:22.456Z
Reserved: 2020-06-25T00:00:00.000Z
Link: CVE-2020-15163
No data.
Status : Modified
Published: 2020-09-09T18:15:22.480
Modified: 2024-11-21T05:04:58.837
Link: CVE-2020-15163
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA