Skip to content

[🐸 Frogbot] Update version of github.com/theupdateframework/go-tuf/v2 to 2.4.1#37

Closed
github-actions[bot] wants to merge 3 commits intomainfrom
frogbot-github.com/theupdateframework/go-tuf/v2-0d84cff71b80eb53c2cf41a0ec44958f
Closed

[🐸 Frogbot] Update version of github.com/theupdateframework/go-tuf/v2 to 2.4.1#37
github-actions[bot] wants to merge 3 commits intomainfrom
frogbot-github.com/theupdateframework/go-tuf/v2-0d84cff71b80eb53c2cf41a0ec44958f

Conversation

@github-actions
Copy link
Copy Markdown
Contributor

🚨 This automated pull request was created by Frogbot and fixes the below:

📦 Vulnerable Dependencies

Severity ID Contextual Analysis Direct Dependencies Impacted Dependency Fixed Versions
medium
Medium
CVE-2026-24686 Not Covered github.com/theupdateframework/go-tuf/v2:v2.3.1 github.com/theupdateframework/go-tuf/v2 v2.3.1 [2.4.1]

🔖 Details

Vulnerability Details

Contextual Analysis: Not Covered
Direct Dependencies: github.com/theupdateframework/go-tuf/v2:v2.3.1
Impacted Dependency: github.com/theupdateframework/go-tuf/v2:v2.3.1
Fixed Versions: [2.4.1]
CVSS V3: 4.7

go-tuf is a Go implementation of The Update Framework (TUF). go-tuf's TAP 4 Multirepo Client uses the map file repository name string (repoName) as a filesystem path component when selecting the local metadata cache directory. Starting in version 2.0.0 and prior to version 2.4.1, if an application accepts a map file from an untrusted source, an attacker can supply a repoName containing traversal (e.g., ../escaped-repo) and cause go-tuf to create directories and write the root metadata file outside the intended LocalMetadataDir cache base, within the running process's filesystem permissions. Version 2.4.1 contains a patch.


@mnsboev mnsboev added the dependencies Updates to project dependencies label Mar 26, 2026
@mnsboev mnsboev closed this Mar 26, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Updates to project dependencies

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants