GHSA-r7vq-6425-j94w – tuf
Package
Manager: pip
Name: tuf
Vulnerable Version: >=0.14.0 <0.16.0
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: N/A pctlN/A
Details
Python-TUF vulnerable to incorrect threshold signature computation for new root metadata ### Impact The function `_verify_root_self_signed()`, introduced in [v0.14.0](https://github.com/theupdateframework/tuf/releases/tag/v0.14.0), and which verifies self-signatures in a new root metadata file, counted multiple signatures by any new root key towards the new threshold. That is, any single new root key could theoretically provide enough signatures to meet the threshold for new key self-signatures required during root metadata update. A scenario where this attack could be relevant is amazingly unlikely in practice to the point where labeling this issue as a security advisory is potentially overstating the impact of the issue. Given that new root keys only become trusted by the client after a successful root metadata update, which also requires the quorum of signatures from old trusted root keys, this issue has been evaluated as low in severity. In particular, in order to exploit this vulnerability, an attacker must: 1. Control one new root key. 2. Craft a new root metadata file such that there is a number of signatures by this new root key greater than or equal to the new threshold. 3. Cause a valid threshold of the old root keys to sign this new root metadata file. 4. Cause this new root metadata file to be published on the repository. 5. Cause clients to rotate to this new root metadata file. ### Patches A [fix](https://github.com/theupdateframework/tuf/commit/83ac7be525b733f79a7e9bc573ec580ec835f179) is available since [version 0.16.0](https://github.com/theupdateframework/tuf/releases/tag/v0.16.0). ### Workarounds No workarounds are known for this issue. ### References * Pull request resolving the issue [PR 1218](https://github.com/theupdateframework/tuf/pull/1218) * Pull request which introduced the faulty computation of signature threshold on new root metadata [PR 1101](https://github.com/theupdateframework/tuf/pull/1101) * A similar previous issue with incorrectly computed signature thresholds in tuf is described in [GHSA-pwqf-9h7j-7mv8](https://github.com/theupdateframework/tuf/security/advisories/GHSA-pwqf-9h7j-7mv8)
Metadata
Created: 2022-09-15T03:35:12Z
Modified: 2022-09-15T03:35:12Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-r7vq-6425-j94w/GHSA-r7vq-6425-j94w.json
CWE IDs: []
Alternative ID: N/A
Finding: F163
Auto approve: 1