No protection against rollback attacks for roles other than root
Description
**EDIT:** please ignore, I think the below message just got stuck in the tubes for 5 months
…----------------------------------------------------------------------------
I will review by EOD Wednesday. Can’t commit to earlier right now unfortunately. Thanks for coordinating Joshua
On Apr 25, 2022, at 11:52 AM, Joshua Lock ***@***.***> wrote:
Adding @znewman01 (newly minted maintainer) for a chance to review and comment.
I really want to get this published this week unless there are any major roadblocks. @cedricvanrompay-datadog @asraa @znewman01 please indicate here whether you intend to review (ideally before EOD Wednesday).
—
Reply to this email directly, view it on GitHub, or unsubscribe.
You are receiving this because you are either an administrator on theupdateframework/go-tuf, or a collaborator on GHSA-66x3-6cw3-v5gj.
|
Impact
go-tuf does not correctly implement the client workflow for updating the metadata files for roles other than the root role. Specifically, checks for rollback attacks are not implemented correctly meaning an attacker can cause clients to install software that is older than the software which the client previously knew to be available, and may include software with known vulnerabilities.
In more detail, the client code of go-tuf has several issues in regards to preventing rollback attacks:
Patches
A fix is available in version 0.3.0 or newer.
Workarounds
No workarounds are known for this issue apart from upgrading.
References
For more information
If you have any questions or comments about this advisory: