A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks.
References
| Link | Resource |
|---|---|
| https://github.com/sparkle-project/Sparkle/pull/2550 | Issue Tracking Patch |
| https://sparkle-project.org/documentation/security-and-reliability/ | Patch |
| https://security.netapp.com/advisory/ntap-20250124-0008/ | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-02-04 20:15
Updated : 2025-08-05 14:35
NVD link : CVE-2025-0509
Mitre link : CVE-2025-0509
CVE.ORG link : CVE-2025-0509
JSON object : View
Products Affected
netapp
- hci_compute_node
- oncommand_workflow_automation
sparkle-project
- sparkle
CWE
CWE-552
Files or Directories Accessible to External Parties
