Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1yN3ZxLTY0MjUtajk0d84AAuz1
Python-TUF vulnerable to incorrect threshold signature computation for new root metadata
Impact
The function _verify_root_self_signed()
, introduced in v0.14.0, and which verifies self-signatures in a new root metadata file, counted multiple signatures by any new root key towards the new threshold. That is, any single new root key could theoretically provide enough signatures to meet the threshold for new key self-signatures required during root metadata update.
A scenario where this attack could be relevant is amazingly unlikely in practice to the point where labeling this issue as a security advisory is potentially overstating the impact of the issue. Given that new root keys only become trusted by the client after a successful root metadata update, which also requires the quorum of signatures from old trusted root keys, this issue has been evaluated as low in severity.
In particular, in order to exploit this vulnerability, an attacker must:
- Control one new root key.
- Craft a new root metadata file such that there is a number of signatures by this new root key greater than or equal to the new threshold.
- Cause a valid threshold of the old root keys to sign this new root metadata file.
- Cause this new root metadata file to be published on the repository.
- Cause clients to rotate to this new root metadata file.
Patches
A fix is available since version 0.16.0.
Workarounds
No workarounds are known for this issue.
References
- Pull request resolving the issue PR 1218
- Pull request which introduced the faulty computation of signature threshold on new root metadata PR 1101
- A similar previous issue with incorrectly computed signature thresholds in tuf is described in GHSA-pwqf-9h7j-7mv8
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1yN3ZxLTY0MjUtajk0d84AAuz1
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: over 1 year ago
Updated: over 1 year ago
Identifiers: GHSA-r7vq-6425-j94w
References:
- https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-pwqf-9h7j-7mv8
- https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-r7vq-6425-j94w
- https://github.com/theupdateframework/python-tuf/pull/1218
- https://github.com/theupdateframework/tuf/pull/1101
- https://github.com/advisories/GHSA-r7vq-6425-j94w
Blast Radius: 0.0
Affected Packages
pypi:tuf
Dependent packages: 2Dependent repositories: 39
Downloads: 222,575 last month
Affected Version Ranges: >= 0.14.0, <= 0.15.0
Fixed in: 0.16.0
All affected versions: 0.14.0, 0.15.0
All unaffected versions: 0.7.5, 0.9.8, 0.9.9, 0.10.0, 0.10.1, 0.10.2, 0.11.0, 0.11.1, 0.12.0, 0.12.1, 0.12.2, 0.13.0, 0.16.0, 0.17.0, 0.18.0, 0.18.1, 0.19.0, 0.20.0, 1.0.0, 1.1.0, 2.0.0, 2.1.0, 3.0.0, 3.1.0, 3.1.1, 4.0.0