Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-0224 Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.
Github GHSA Github GHSA GHSA-f8mr-jv2c-v8mg Invalid root may become trusted root in The Update Framework (TUF)
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T13:08:22.456Z

Reserved: 2020-06-25T00:00:00

Link: CVE-2020-15163

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-09T18:15:22.480

Modified: 2024-11-21T05:04:58.837

Link: CVE-2020-15163

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.