Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-23992

Опубликовано: 22 янв. 2026
Источник: debian
EPSS Низкий

Описание

go-tuf is a Go implementation of The Update Framework (TUF). Starting in version 2.0.0 and prior to version 2.3.1, a compromised or misconfigured TUF repository can have the configured value of signature thresholds set to 0, which effectively disables signature verification. This can lead to unauthorized modification to TUF metadata files is possible at rest, or during transit as no integrity checks are made. Version 2.3.1 fixes the issue. As a workaround, always make sure that the TUF metadata roles are configured with a threshold of at least 1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-github-theupdateframework-go-tufunfixedpackage
golang-github-theupdateframework-go-tufno-dsatrixiepackage

Примечания

  • https://github.com/theupdateframework/go-tuf/security/advisories/GHSA-fphv-w9fq-2525

  • Fixed by: https://github.com/theupdateframework/go-tuf/commit/b38d91fdbc69dfe31fe9230d97dafe527ea854a0 (v2.3.1)

EPSS

Процентиль: 1%
0.00008
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
17 дней назад

go-tuf is a Go implementation of The Update Framework (TUF). Starting in version 2.0.0 and prior to version 2.3.1, a compromised or misconfigured TUF repository can have the configured value of signature thresholds set to 0, which effectively disables signature verification. This can lead to unauthorized modification to TUF metadata files is possible at rest, or during transit as no integrity checks are made. Version 2.3.1 fixes the issue. As a workaround, always make sure that the TUF metadata roles are configured with a threshold of at least 1.

CVSS3: 5.9
nvd
17 дней назад

go-tuf is a Go implementation of The Update Framework (TUF). Starting in version 2.0.0 and prior to version 2.3.1, a compromised or misconfigured TUF repository can have the configured value of signature thresholds set to 0, which effectively disables signature verification. This can lead to unauthorized modification to TUF metadata files is possible at rest, or during transit as no integrity checks are made. Version 2.3.1 fixes the issue. As a workaround, always make sure that the TUF metadata roles are configured with a threshold of at least 1.

CVSS3: 5.9
github
17 дней назад

go-tuf improperly validates the configured threshold for delegations

CVSS3: 5.9
fstec
20 дней назад

Уязвимость функции metadata.VerifyDelegate() фреймворка для обеспечения безопасности систем обновления программного обеспечения go-tuf, позволяющая нарушителю получить доступ на чтение и изменение данных

EPSS

Процентиль: 1%
0.00008
Низкий