A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks.
The product makes files or directories accessible to unauthorized actors, even though they should not be.
Link | Tags |
---|---|
https://github.com/sparkle-project/Sparkle/pull/2550 | patch issue tracking |
https://sparkle-project.org/documentation/security-and-reliability/ | patch |
https://security.netapp.com/advisory/ntap-20250124-0008/ | vendor advisory |