Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. tuf
  4. ›
  5. GMS-2022-4197

GMS-2022-4197: Python-TUF vulnerable to incorrect threshold signature computation for new root metadata

September 15, 2022

The function _verify_root_self_signed(), introduced in v0.14.0, and which verifies self-signatures in a new root metadata file, counted multiple signatures by any new root key towards the new threshold. That is, any single new root key could theoretically provide enough signatures to meet the threshold for new key self-signatures required during root metadata update. A scenario where this attack could be relevant is amazingly unlikely in practice to the point where labeling this issue as a security advisory is potentially overstating the impact of the issue. Given that new root keys only become trusted by the client after a successful root metadata update, which also requires the quorum of signatures from old trusted root keys, this issue has been evaluated as low in severity.

References

  • github.com/advisories/GHSA-r7vq-6425-j94w
  • github.com/theupdateframework/python-tuf/pull/1218
  • github.com/theupdateframework/python-tuf/security/advisories/GHSA-r7vq-6425-j94w
  • github.com/theupdateframework/tuf/pull/1101

Code Behaviors & Features

Detect and mitigate GMS-2022-4197 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.14.0 up to 0.15.0

Fixed versions

  • 0.16.0

Solution

Upgrade to version 0.16.0 or above.

Source file

pypi/tuf/GMS-2022-4197.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:53 +0000.