PyPi: In-Toto

CVE-2023-32076

Safety vulnerability ID: 58654

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at May 10, 2023 Updated at May 14, 2024
Scan your Python projects for vulnerabilities →

Advisory

In-toto 2.0.0 fixes a security issue: Configuration Read From Local Directory.
https://github.com/in-toto/in-toto/security/advisories/GHSA-wc64-c5rv-32pf

Affected package

in-toto

Latest version: 3.0.0

A framework to define and secure the integrity of software supply chains

Affected versions

Fixed versions

Vulnerability changelog

This release includes breaking changes such as the removal of the user_settings
module and changes to exceptions raised during artifact recording. Additionally,
it incorporates changes for issues captured in security advisories
[GHSA-p86f-xmg6-9q4x](https://github.com/in-toto/docs/security/advisories/GHSA-p86f-xmg6-9q4x),
[GHSA-jjgp-whrp-gq8m](https://github.com/in-toto/in-toto/security/advisories/GHSA-jjgp-whrp-gq8m),
and
[GHSA-wc64-c5rv-32pf](https://github.com/in-toto/in-toto/security/advisories/GHSA-wc64-c5rv-32pf),
the last of which has been assigned
[CVE-2023-32076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32076).

Added
* Generic interface for ITE-4 resolvers (584)
* ITE-4 resolver for OSTree repositories (585)
* Warning when `--bits` is used with non RSA keys in `in-toto-keygen` (588)
* Support for GitHub's security reporting feature (567)
* Tool to check local artifacts against in-toto link metadata
(589, GHSA-p86f-xmg6-9q4x)
* Testing in CI for Python 3.11 (594)

Changed
* Recording of file hashes to use ITE-4 file resolver (584)
* Exceptions returned to Python defaults when recording file artifacts (592)
* Documentation about in-toto governance to reflect project changes (591)
* Code style to use black + isort, includes update to codebase to conform (593)
* Verification documentation to reflect how PGP trust model is used
(GHSA-jjgp-whrp-gq8m)

Removed
* Support for user_settings module that enabled configuring in-toto via RC files
and environment variables (GHSA-wc64-c5rv-32pf)

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 5.5

CVSS v3 Details

MEDIUM 5.5
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
LOW
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
HIGH
Availability Availability (A)
NONE