First published: Tue Feb 04 2025(Updated: )
A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks.
Affected Software | Affected Version | How to fix |
---|---|---|
swift/github.com/sparkle-project/Sparkle | <=2.6.3 | 2.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-wc9m-r3v6-9p5h is high due to the potential for attackers to replace legitimate signed updates.
To fix GHSA-wc9m-r3v6-9p5h, upgrade Sparkle to version 2.6.4 or later.
GHSA-wc9m-r3v6-9p5h affects Sparkle versions earlier than 2.6.4.
GHSA-wc9m-r3v6-9p5h describes a vulnerability where an attacker can replace an update payload and circumvent signing checks.
While no specific exploits are publicly available for GHSA-wc9m-r3v6-9p5h, the vulnerability allows manipulation of signed updates.