Bug 2431929 (CVE-2026-23992)
| Summary: | CVE-2026-23992 github.com/theupdateframework/go-tuf/v2: go-tuf improperly validates the configured threshold for delegations | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | akoudelk, dfreiber, drow, eborisov, jburrell, lball, lbragsta, ljawale, luizcosta, ngough, nweather, rbobbitt, sdawley, teagle, veshanka, vkumar, wenshen |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
An integrity check flaw has been discovered in go-tuf. A compromised or misconfigured TUF repository can have the configured value of signature thresholds set to 0, which effectively disables signature verification. This can lead to unauthorized modification to TUF metadata files at rest, or during transit as no integrity checks are made.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2433100, 2433102, 2433104, 2433106, 2433107 | ||
| Bug Blocks: | |||
|
Description
OSIDB Bzimport
2026-01-22 03:01:41 UTC
|